Tuesday, April 16, 2019
Final Paper Essay Example for Free
Final Paper Essay tooshie corporation is one of the biggest retailers there is come on there, realiseing in an estimate of $74 million dollars a year in revenue. Majority of point revenue is earned during the busiest eon of the year, which atomic number 18 Black Friday and holidays. sucker has had a huge positive reputation because of the give birth More Pay Less promise and better-looking 5% back to the community. However, Target has been going done some hard times because of the Target let out that occurred during the holidays of 2013. This research paper will focus foremost on introducing the Target breach and how it has affected the union and what the community has done to fix the puzzle. Moving forward, I will focus on midland check offs that Target could have applied and summarizing everything towards the end. Target Breach Internal Controls Target Corporation is a well cognise and respected retail store out there. Target is a corporation that buys goods f rom manufactures at a barter for discount price and reselling it to consumers in a higher price to make a profit. Target has brought in revenue of $74 million dollars a year and upholds to grow every year.However, Target has gone through some hard times with the Target breach that just occurred during the holidays of 2013. Consumers have had a hard time trusting their brainpower readers and obedience and sales have been dropping ever since. The question that is now in the air is what versed controls that comp either had during this breach and what could they have done to bar this breach that just occurred. To fetch with, the attach to was running perfectly and driving outstanding sales until the company and guest found out that they had a breach, also known to the community as the Target Breach.Target corporation confirmed that a major data breach occurred between Black Friday and December 15, 2013, which includes many of the most important obtain days of the year (Edelson, 2013). Ever since the Target breach, the companys reputation was hurt, consumers were not confident close to shopping, and are afraid of using the beleaguer readers at the stores. Later in time, after the breach was announced, the company had given further information on how the breach affected the people.It is believed that the breach affected roughly 40,000 neb devices at store registers, which could mean that millions of cardholders could be vulnerable, according to the people familiar with the incident (Sidel, 2013). On die of the 40,000 card devices being affected, 40 million peoples reference book card and debit card information was stolen. The CEO of Target Corporation later released to the press and announced that personal information such(prenominal) as address, names, phone poem, and e-mail address were also interpreted from the Target system.After reading well-nigh the Target breach, being an assistant autobus for Target, and hearing about the tragic that has been caused, I remember signature upset because of the way the company was going to be affected. However, it also reminded of the internal control concept that was purview in class. there was a lot of fraudulence involved with the Target breach, which is something that occurs when it comes to intern control. Fraud refers to any act by the steering or employees of descent involving an internal deception for personal gain.Fraud may include, among other acts, embezzlement of business cash, theft of assets, filing false insurance claims, filing false wellness claims, and financial statement fraud (Ferris, Wallace, Christensen, 2014, pg. 314). With the Target breach, you are able to see the fraud triangle concepts, which populate of pressure, opportunity, and rationalization. Being employed by Target, that concept came into mine when reading the article because there was an e-mail displace to management about believing that an employee that worked with the POS (point on sale) system had a lot of inside information deep down the system.The pressure was there to get information from the POS system and rationalization was involved when they knew that they can get credit card information. The opportunity occurred when they knew the busiest time of the year was going to be Black Friday and majority of the sales are driven in that day. From all that has occurred it is not clear what internal controls Target had in mark to avoid this situation. Internal controls are important when it comes to businesses in magnitude to avoid situation like the Target breach.There are two parts that I believe that important when it comes to internal controls, which are prevention control and detection control. A prevention control is intended to deter a problem or fraud before it can arise (Ferris, Wallace, Christensen, 2014, pg. 316). Target should have followed the prevention control with the POS system in order to avoid the Target breach. A detection control, on the other hand, is designed to discover any problems or fraud shortly it arises (Ferris, Wallace, Christensen, 2014, pg. 316).Target followed the detection control after the problem of the breach was brought and took justice in their own hands in order to fix the problem. The first thing Target did was post a prominent message on its Web site, Important notice unauthorized access to payment card data in the U. S. stores. The message linked to a letter alerting customers that a breach occurred and outlining locomote Target is taking to a voice a recurrence (Edelson, 2013). Another step that Target has taken is work outing justice for the information was that was stolen out of their systems.Target had invested $5 million dollars into a multi-year campaign in order to stop phishing scams (Target, 2013). Target has longstanding history of commitment to our communities, and cyber security is one of the most public press issues facing consumers today, said Steinhafel. We are proud to be working with three trusted organizations-the National Cyber-Forensics and homework Alliance (NCFTA), National Cyber Security Alliance (NCSA) and Better Business Bureau (BBB)- to advance public upbringing around cyber security (Target, 2013).Target has gone to long measures to protect the information of the guest and reinsure loyalty by offering ProtectMyID, which keeps track of credit reports, monitoring, and identity theft (Target, 2013). As an apology to the guest, Target offered a 10% off discount to all guests which were a huge success for the company but numbers of transactions was cash paid. Being an employee for Target, we are still determine to follow our core roles, continue delivering the Expect More Pay Less promise, and delivering an excellent shopping experience for our guest in order to continue driving profitable sales and guest loyalty.In order to avoid this situation and detect the problem ahead of time, Target should have incorporated the following elements that are designed f or prevention and detection controls. The first element is establish clear lines of authority and responsibility, which is giving authority to a supervisor or manager but also evaluation their consequently to companies policies and rules. Implement segregation of duties, requires that when allocating various duties within the accounting system, management should make sure that no employee is assigned too many different responsibilities (Ferris, Wallace, Christensen, 2014, pg.317). Hire competent personnel, which the company sees if that person has the education and qualified skills to perform that job. Use control number on all business documents, which is having all important documents with control numbers. Develop plans and budgets, which is having a plan and budget in order to bring the company forward. For example, the $5 million dollars that were invested in the anti fraud software in order to bring guest loyalty back. Maintain adequate accounting records, which is making sure that the company has the most youthful accounting records.For example, the number of fraud claims that were reported under guest bank statements in order to reinvers their notes back. Provide physical and electronic controls, is locking their doors or important files to prevent theft, which should have happened with the POS system. Conduct internal audit, is a company function that provided independent appraisals of the companys financial statement, its internal control, and its operations (Ferris, Wallace, Christensen, 2014, pg. 319).In conclusion, we are able to see how the company was impacted from the breach that had occurred and the actions that the company has taken in order to fix the problem. People information had been stolen and finances have been tampered through it. We are able to see how internal controls play an important part when it comes to finances, accounting, and to businesses such as Target. If the proper elements and procedures had been applied with internal control I am sure that all of this could have been avoided or reduced.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.