Lush Fresh Handmade Cosmetics that is commonly trademarked as LUSH is a producer and marketer of ethical beauty products headquartered in the United Kingdom with more than 400 stores across the globe. The company produces and sells a wide range of handmade products such as soaps, hair treatment, face masks, hand and body lotions, and bath bombs. These products are made from natural ingredients like fruits and vegetables including those that are rarely used in cosmetics. Consequently, the trademark of the company's brand is its enthusiasm for fresh and natural homemade products.
Lush Fresh Handmade Cosmetics packages its products in sizes, shapes, colors and aromas that can easily be mistaken for edible items. Notably, Lush does not use animal fats in their product since the company is against animal testing but conduct tests with volunteers only. The firm's success is also attributed to its employees' passion and enthusiasm for their work which is transferred into an addictive in-store customer experience. Additionally, the company's success is signified by its products, packaging, and promotions.
Company History:
The initial establishment of what has now become Lush Fresh Handmade Cosmetics Company was initiated in 1976 by Mark Constantine and Elizabeth Weir. The beauty business, which was known as Constantine and Weir (C&W) Plc, developed a series of bath and body products in Poole, Dorset, UK. This company also began to supply its cosmetic products that were developed naturally to various retailers in the area. The company continued to grow and became a constant supplier to the rapidly growing chain of cosmetics products in 1977. Together with his team at the firm, Constantine introduced the anti-animal testing angle in the cosmetics business.
As a regular supplier of cosmetics products to the rapidly growing chain of The Body Shop, Constantine and Weir Plc also grew rapidly. The company was known for its innovative product ideas that made it a very successful and profitable firm with estimated sales of £8.5 million. Following a sour relationship with The Body Shop in the late 1980s because of the refusal of some of Constantine's product ideas, Constantine began a mail order catalogue business known as Cosmetics to Go (CTG) with its headquarters in Poole. The venture sold natural and handmade beauty products as well as perfumes, which were not animal-tested.
With a minimal packaging of its products, this venture became a big failure because it could not meet customers' orders quickly enough though it had established a huge customer base and grew rapidly. However, the business was later re-invented after Constantine and his team began a retail business. This initiative marked the birth of today's Lush Company, whose first store was formally opened on May 23, 1995 at Poole, Dorset, UK. By the end of 2006, the company had over 400 shops across the globe located in 29 countries following its increasingly rapid growth, success and profitability. Since 2006, Lush Fresh Handmade Cosmetics has increased its operations to over 600 stores that are located in more than 43 countries around the world. This rapid growth and success can be attributed to various factors including innovative product ideas and design, friendly customer experience, and multi-channel distribution strategy.
Current Issue at Lush Cosmetics:
The growth, success and profitability of Lush Fresh Handmade Cosmetics have also been affected by various issues and challenges that the company has faced throughout its history. For example, the company was faced with the fear of making mistakes when it embarked on new product development initiative. The major issue Lush has faced in the recent past is the aggressive hack attack that took place between October 2010 and January 2011 (Kennedy par, 3). This reinforced the need for companies involved in internet marketing like Lush to ensure that they develop a strong and secure e-commerce platform during website development.
Lush Hacker and Data Breach Problem:
While the company gave minimal details regarding their hacking attack, it reported that there were successful initial intrusion and repetitive attempts at re-entry on their website. The company also reported that it was only their UK website that was affected by these hackers. Following the attack, Lush advised its customers who placed an online order between October 4, 2010 and January 20, 2011 to get in touch with their banks, stating that their credit card details had been compromised.
After stealing credit cards information during the hack attack on the company's UK website, the cyber thieves were cashing. Consequently, Lush was forced to shut down its online shop in January 21, 2011 and replaced its homepage with a message about the attack. During this period of the attack, many of the firm's customers...
Anonymous is one of the groups that can be seen as participating in this form of hacktivism, as is Wikileaks. Wikileaks is probably the best know hactivist site to the general public because of the sheer volume of political information that it has made public and because of the unapologetic nature of the owner of the site. This is unfortunate in many ways because it has given individuals a false
They would sometimes be using the school curriculum as an excuse to hack pertinent information that are government or privately owned. At some point, these students would be challenging themselves if they will be able to create and send unnecessary information (such as computer viruses) to other computer systems. This will provide extreme joy and satisfaction for these students. However, the issue here lies on how can this be
Hacktivism Securing the Electronic Frontier Consider how cybercrime is defined and how it relates to the issue Internet vulnerabilities. Cybercrime is any illegal or illicit activity which is mediated by internet usage and which is aimed at accessing, stealing or destroying online data. This may include hacking of government websites, phishing scams, disruption of commercial service sites or penetration of privately held databases containing personal information about private citizens. The presentation given by
Such people may not generally take shelter under the canopy of hackers but as a result of the more serious attributes of their motivation. (Hacker Motivation) Most of the people are anxious about the probability of being an objective for exploitation by a hacker. It is quite normal that if a computer has been installed for home use and only connected to the Internet for two hours once a
Hacker Hacking, Web Usage and the Internet Hierarchy Computer hacking is perceived as a crime and is frequently motivated by economic interests such as the stealing of personal and credit information, or by ideological interests such as the disruption of a company's service or the acquisition of classified information from government or corporate sites. However, hacking is also quite frequently used as an instrument for the expression of political, philosophical and practical frustrations.
Hacker Culture and Mitigation in the International Systems The explosion of the internet technology in the contemporary business and IT environments has assisted more than 300 million computer users to be connected through a maze of internet networks. Moreover, the network connectivity has facilitated the speed of communication among businesses and individuals. (Hampton, 2012). Despite the benefits associated with the internet and network technologies, the new technologies have opened the chance
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now