American Express and Data Theft Risk
Scenario
In March 2016, American Express admitted that customer data was stolen from the company in 2013 in a letter to the California Attorney General (Condliffe, 2016). As a credit card company, AMEX works with a large number of merchants, and the data breach came on the merchant end and that the affected customers were notified as soon as was possible. However, this incident provides a learning experience, and the key problem now is how Amex can learn from this experience going forward with respect to how it handles such third-party data breaches in the future. This one particular incident is not the problem, but it highlights a broad category of problems -- credit card fraud and cybercrime -- that cost the industry billions of dollars every year. Managing this better than competitors will be a boon to consumer confidence in the American Express brand and can be a source for both financial and marketplace competitive advantage going forward.
Analysis
American Express competes in the credit card business, wherein it provides consumer credit, and works with retailers who recognize its credit cards to facilitate merchandise purchases. Amex has seen its total revenue decline in 2015 in the face of a competitive industry, and this in turn has reduced the company's profits as well (American Express Form 10K). Despite these struggles, the company cited its many strengths in its annual report, namely higher transaction volumes, industry-leading credit quality, a growing loan portfolio and strong operating expense controls. Another strength of Amex is that it has just recently surpassed MasterCard for the #2 position in the credit card industry, according to SEC filing data (Papadimitrou, 2016)
Working against these strengths are a number of weaknesses that the company faces in its operations. First, it is highly dependent on the U.S. dollar, and a stronger dollar supressed revenues from overseas customers, which were worth less when translated back to USD for financial reporting purposes -- Amex has high translation risk. The company is vulnerable to data breaches, as the core case identifies, in particular where vendors, merchants, and other third-party partners are concerned. While Amex can control its own cybercrime risk, it has very limited ability to control cybercrime risk at third parties that also have access to Amex customer data. Amex remains, however, a distant second behind Visa in market share, and ranks third in terms of global acceptance behind Visa and MasterCard, both of which have a much broader global network (Papadimitrou, 2016).
Working with a reasonably strong financial base and market position, Amex can improve its reputation among consumers by strengthening its credit card fraud prevention. This opportunity represents an improved way of handling such cases of data theft and other fraud. Credit card cybercrime costs the industry billions, but if American Express can develop superior security techniques, it can avoid the attention of thieves, who typically look for weaknesses in security that they can exploit. It is worth noting, however, that while there is significant opportunity to improve upon fraud prevention techniques, fraud remains a threat because the rapid pace of technological development allows criminals to often stay one step ahead of those engaged in cybersecurity (Barker, D'Amato & Sheridon, 2008).
Research shows that reducing opportunities to commit cybercrime is critical to achieving a reduction in such crime. Large credit card frauds in particular tend to be sophisticated crimes, and there are often organized crime links. In particular, criminals who steal the data must then sell that data in order to monetize their theft. The organizations that buy the data are usually the ones that actually commit the frauds. Thus, in order to defend against cybercrimes, it is important to deny the hackers access to data in the first place. Typically, proactive approaches are recommended by cybersecurity experts (Prabowo, 2011).
Alternatives
There are a couple of different alternatives that can be explored. One is to pursue remedies with the other major credit card companies (Visa, MasterCard, Discover). The advantages of pooling resources are that more resources can be put into the effort, and that efforts are not duplicated, leading to more efficient use of the resources that are applied to this problem. If the industry as a whole becomes difficult to scam, then criminals may turn their attention to other industries entirely. Conversely, if the four companies work independently on solutions, there may be enough gaps in the solutions for criminals to exploit, and the companies will forever be playing catch-up as criminals respond quickly to new opportunities...
Utilitarian Viewpoint of Drones Ethical Issues The topic discussed within this document is "Uncharted Territory: When Innovation Outpaces Regulation for Private Use of Drones." What is interesting about this topic is that the crux of it revolves about the fact that quite frequently in technological applications, innovations and availability outstrips regulation and user consistency. For the sake of this document, however, this phenomenon will be explored solely through the usage and
In addition, Sound Transit has installed eight sensing devices for the building, including probes that would register any soil shifting at the tunnel depth. Such alerts would allow Sound Transit time to apply extra grout between the tunnel and the apartment building's basement. 6. Output Analysis and Discussion Here, Sound Transit has taken reasonable and economically feasible precautions to reduce the risk of damage from soil sliding. At this point, the remaining
However, conventional beliefs that there is low rate for African-American involvement in suicidal activities, there exists minimal focus on learning the possible suicide patterns among African-Americans. Social workers are not aware of the risks and protectiveness among African-Americans. This gives room for misinterpretation of facts concerning self-destructive activities of African-Americans. The research further stresses the importance of social workers to the study of suicide among African-Americans. They also have the
(Cha-Jua, 2001, at (http://www.wpunj.edu/newpol/issue31/chajua31.htm) Another aspect of representation, however, concerns collective memory and the representation of a shared past. Through the context for dialogue they create, social movements facilitate the interweaving of individual stories and biographies into a collective, unified frame, a collective narrative. Part and parcel of the process of collective identity or will formation is the linking of diverse experiences into a unity, past as well as present.
Figure 1. Demographic composition of the United States (2003 estimate). Source: Based on tabular data in World Factbook, 2007 (no separate listing is maintained for Hispanics). From a strictly percentage perspective, it would seem that Asian-Americans do not represent much of a threat at all to mainstream American society, but these mere numbers do not tell the whole story of course. For one thing, Asian-Americans are one of the most diverse and
" Human development- behavioral shifts in human being that tae place during the course of an entire lifespan ("Human Behavior"). Risk Analysis- the activity of determining and analyzing the dangerous natural and human caused negative events. This analysis takes into consideration the risks these event pose to businesses individuals and governments. Within the domain of information technology risk analysis reports are utilized to tailor technology-related objectives with a an organization's business objectives.
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now