Case Study

  1. Articulate a position to the question
  2. Support that position with evidence from the case (including quotes or references to the text)
  3. Be clearly written, and 
  4. Demonstrate a critical analysis of the case. 

Answer your questions using the MEAL format (Main idea, Evidence, Analysis, Link).  The first sentence of your answer should include the main idea, or thesis, for the question.  Next, provide evidence with a specific quote or a page number from the case.  Next, analyze the evidence.  Conclude by linking the evidence back to your thesis.

Every question should be answered in two to three paragraphs (minimum), with longer answers expected if the question dictates.

  • The font type is to be Times New Roman, 12 point font
  • The document is to be double spaced, with one-inch margins
  • References to the case study are to be formatted in APA format (reference should be used from Management of Information Security 5th edition by Michael E. Whitman/Herbert J. Mattord)
  1. What are the (a) people, (b) work processes, and (c) technology failure points in TJX’s security that require attention?
  2. How should the company’s IT security be improved and strengthened?
  3. What should TJX’s short-term priorities and long-term plans be?
  4. Was TJX a victim of ingenious cyber crooks or did it create risk by cutting corners?
  5. What lessons can you draw from this case for prevention and response to cyber breaches?

Solution

This question has been answered.

Order Now
Scroll to Top