Garantie de satisfaction à 100% Disponible immédiatement après paiement En ligne et en PDF Tu n'es attaché à rien
logo-home
All Cases For Organizational Change 5th Edition by Gene Deszca, Cynthia Ingols, Evelina Atanassova, Tupper F. Cawsey Chapter 2-11 €17,76   Ajouter au panier

Examen

All Cases For Organizational Change 5th Edition by Gene Deszca, Cynthia Ingols, Evelina Atanassova, Tupper F. Cawsey Chapter 2-11

 6 vues  0 fois vendu
  • Cours
  • Solution Manual
  • Établissement
  • Solution Manual
  • Book

All Cases For Organizational Change 5th Edition by Gene Deszca, Cynthia Ingols, Evelina Atanassova, Tupper F. Cawsey Chapter 2-11

Aperçu 4 sur 139  pages

  • 31 août 2024
  • 139
  • 2024/2025
  • Examen
  • Questions et réponses
  • Solution Manual
  • Solution Manual
avatar-seller
All Cases For
Organizational Change 5th Edition by Gene Deszca, Cynthia Ingols, Evelina Atanassova, Tupper F.
Cawsey
Chapter 2-11



Held Hostage in the 21st Century:
Cybersecurity, Ransomware, and Crisis Management (A) and (B)

Teaching Note



Executives across industries increasingly have a particular risk to manage: cybersecurity. 1 This case
set addresses cybersecurity through the lens of one manager‟s experience, paying particular attention to
how she communicates with a broad array of stakeholders about the incident and company response. The
case serves the educational interests of those aiming to train managers in areas such as crisis
communication, risk management, and voicing values in matters of organizational decision-making.


Case Synopsis

Anni Anderson is the founder and CEO of Selah, a software and application company that aims to
support users with everyday communication (similar to a company like Duolingo, for instance). Selah is a
relatively young start-up that saw explosive customer-acquisition growth during the COVID-19
pandemic. Much to Anderson‟s disappointment, Selah experiences a ransomware attack on the eve of
closing its largest ever round of funding from venture capitalists. As Anderson surveys her executive team
in an emergency meeting, it becomes clear that the ransomware attack jeopardizes Selah‟s standing not
only among users but also among investors. Additionally, Anderson must communicate with Selah‟s staff
and board of directors, not to mention regulators, industry partners, and the media. In the A case,
Anderson‟s challenge is to organize and communicate her company‟s response vis-à-vis the cyberattack.
In the B case, we read a synopsis of effective responses that have actually been deployed in such
situations.


Intended Use

This case is intended for use at the MBA and executive-education levels in courses on topics such as
communication, information technology (IT), risk management, public relations, leadership, and ethics.
The approach to teaching embedded in the case is based on the Giving Voice to Values (GVV)
curriculum. This case is part of the GVV collection.2


Learning Objectives



1 This material is part of the Giving Voice to Values (GVV) curriculum. The Yale School of Management was the founding partner, along with the

Aspen Institute, which also served as the incubator for GVV. From 2009 to 2015, GVV was hosted and supported by Babson College. The case is
fictional: Anni Anderson and Selah represent composites of real-world experiences.
2 Giving voice to values. IBIS Initiatives, Darden School of Business. Retrieved April 26, 2022, from
https://www.darden.virginia.edu/ibis/initiatives/gvv

, This case is designed to help students practice the following:
 devising a strategic approach toward crisis communications in relation to multiple stakeholders--
both internal and external to the organization--with varying interests,
 crafting specific messaging that targets audiences to take desired actions,
 planning for risk mitigation and response, amounting to a Mini handbook on cybersecurity risk
management, and
 reflecting on the broader implications and complexities involved in cybersecurity risk and
organizational leadership.


References and Background Reading

 Brown, S. (2022, January 19). How to respond to a ransomware attack: Advice from a federal
agent. MIT Sloan. Retrieved April 27, 2022, from https://mitsloan.mit.edu/ideas-made-to-
matter/how-to-respond-to-a-ransomware-attack-advice-a-federal-agent
 McMillan, R., De Avila, J., & Bunge, J. (2021, June 2). NYC‟s subway operator and Martha‟s
Vineyard Ferry latest to report cyberattacks. Wall Street Journal. Retrieved April 27, 2022, from
https://www.wsj.com/articles/ransomware-scourge-continues-as-essential-services-are-hit-
11622672685
 The 2021 geography of cryptocurrency report: Analysis of geographic trends in cryptocurrency
adoption and usage. (October 2021). Chainalysis.
 Information risk insights study 2020: A clearer vision for assessing the risk of cyber incidents.
(2020). Cyentia Institute, and Advisen. Retrieved April 27, 2022, from
https://www.cyentia.com/wp-content/uploads/IRIS2020_cyentia.pdf
 Poulsen, K., McMillan, R., & Evans, M. (2021, September 30). A hospital hit by hackers, a baby
in distress: The case of the first alleged ransomware death. Wall Street Journal. Retrieved April
27, 2022, from https://www.wsj.com/articles/ransomware-hackers-hospital-first-alleged-death-
11633008116
 Nakashina, E., & Lerman, R. (2021, September 21). FBI held back ransomware decryption key
from businesses to run operation targeting hackers. Washington Post. Retrieved March 3, 2022,
from https://www.washingtonpost.com/national-security/ransomware-fbi-revil-decryption-
key/2021/09/21/4a9417d0-f15f-11eb-a452-4da5fe48582d_story.html
 McMillan, R., Volz, D., & Hobbs, T. D. (2021, March 11). Beyond colonial pipeline, ransomware
cyberattacks are a growing threat. Wall Street Journal. Retrieved April 27, 2022, from
https://www.wsj.com/articles/colonial-pipeline-hack-shows-ransomware-emergence-as-
industrial-scale-threat-11620749675
 Schifrin, N. (2021, October 15). International community joins forces as ransomware attacks
create major disruptions. PBS NewsHour. Retrieved April 27, 2022, from
https://www.pbs.org/newshour/show/international-community-joins-forces-as-ransomware-
attacks-create-major-disruptions
 Lyngaas, S. (2020, March 16). Why the Norsk hydro attack is a “blueprint” for disruptive hacking
operations. CyberScoop. Retrieved April 27, 2022, from https://www.cyberscoop.com/norsk-
hydro-lockergoga-ransomware/

,  Pearlson, K., Sposito, S., Arbisman, M., & Schwartz, J. A. (2021, September 30). How Yahoo
built a culture of cybersecurity. Harvard Business Review. Retrieved April 27, 2022, from
https://hbr.org/2021/09/how-yahoo-built-a-culture-of-cybersecurity
 Rosenbaum, E. (2021, August 10). Main street overconfidence: America‟s small businesses aren‟t
worried about hacking. CNBC. Retrieved April 27, 2022, from
https://www.cnbc.com/2021/08/10/main-street-overconfidence-small-businesses-dont-worry-
about-hacking.html
 Stackpole, B. (2022, March 15). How to build a culture of cybersecurity. Ideas Made to Matter,
MIT Sloan School of Management. Retrieved April 27, 2022, from
https://mitsloan.mit.edu/ideas-made-to-matter/how-to-build-a-culture-
cybersecurity?utm_source=thinkingforward&utm_medium=email&utm_id=cyberculture
 The inside story of how Sony handled the biggest hack in history. Inc.Com, Associated Press.
Retrieved March 6, 2022, from https://www.inc.com/associated-press/sony-ceo-call-to-google-
got-interview-out.html
 Treasury rakes robust actions to counter ransomware. (2021, September 21). US Department of
the Treasury Press Release. Retrieved April 27, 2022, from https://home.treasury.gov/news/press-
releases/jy0364
 Yuan, E. S. (2020, April 1). A message to our users. Zoom Blog (blog). Retrieved April 27, 2022,
from https://blog.zoom.us/a-message-to-our-users/


Research Methodology

Though the protagonist and company in this case are fictional, they are representative of real-world
experiences. To avoid identification while simultaneously ensuring authenticity, this case is a composite
of several real-life situations, including, but not limited to, the following:
 Colonial Pipeline Co. (2021)
 JBS S.A. (2021)
 Kaseya (2021)
 New York Metropolitan Transportation Authority (2021)
 Norsk Hydro ASA (2019)
 Sony Pictures Entertainment Inc. (2014)
 T-Mobile US, Inc. (2021)
 United Health Services Hospitals Inc. (2020)
 University of California, San Francisco (2020)
 Zoom Video Communications, Inc. (2020)

Information about these organizations and their respective cybersecurity experiences is available in
the public record.


Teaching Plan

Preparation

, 1. Read or review an overview of the philosophy and assumptions of GVV. Ideally, students
should be grounded in the GVV process of analyzing situations and articulating how they
would voice solutions. To achieve this goal, the instructor should assign preparatory reading:
either “Ways of Thinking about Our Values in the Workplace” (UVA-OB-1126) or “Giving
Voice to Values: Brief Introduction” (UVA-OB-1203).3 Some faculty may also find it useful to
have students read “Starting Assumptions for Giving Voice to Values” (UVA-OB-1108).4 If
they wish to go deeper, faculty may assign “Scripts and Skills: Readings” (UVA-OB-1120).5
These documents can be found at Darden Business Publishing‟s online storefront; they are free
of charge.6
2. Students should read “Held Hostage in the 21st Century: Cybersecurity, Ransomware, and
Crisis Management (A)” (UVA-OB-1392) in advance of the class session.7

In-class activity

1. Reintroduce GVV

To start the class discussion, the instructor should remind students that the GVV curriculum makes
several assumptions:
 Students will encounter conflicts in values among their peers, their customers, stakeholders,
and the norms of their environments, whether in the public or private sector.
 The best way to deal with these conflicts in values is to be clear about one‟s own values,
and to know that one has the confidence and skills necessary to effectively voice and enact
those values.
 Research suggests that thinking through the issues prior to encountering a difficult situation
and practicing what one will say are critical steps in preparing to give voice to one‟s values.
2. Students may work in teams--in advance of the class or during class--to address the GVV
discussion questions:
a. What values are involved in the situation? What is the values-based position that you, the
protagonist, want to take?
The instructor can introduce the problem by saying the following:
Imagine you are Anderson. You have both professional and personal values involved in this
situation. Professionally, as founder and CEO of Selah, you take seriously the value of
stewardship--safeguarding, promoting, and acting on behalf of the organization‟s interests.
Relatedly, as a steward of Selah, you want to demonstrate and reinforce the company‟s
three compass values: care, courage, and collaboration. Meanwhile, on a personal level,
your single-biggest pressure point is the value of integrity. Integrity in this situation for you
looks like honesty, following your convictions, and doing what you think is right rather
than what might appear to be easiest.
If Anderson wants to demonstrate these values in responding to the crisis, what might she
say and do?
b. What are your objectives?


3 Gentile, M.C. (2010). Ways of thinking about our values in the workplace (UVA-OB-1126). Darden Business Publishing; Gentile, M.C. (2010). Giving voice

to values: Brief introduction (UVA-OB-1203). Darden Business Publishing.
4 Gentile, M.C. (2010). Starting assumptions for giving voice to values (UVA-OB-1108). Darden Business Publishing.
5 Gentile, M.C. (2010). Scripts and skills: Readings (UVA-OB-1120). Darden Business Publishing.
6 Giving voice to values. Darden Business Publishing. Retrieved April 26, 2022, from http://store.darden.virginia.edu/giving-voice-to-values
7 Feehan, R., & Gentile, M.C. (2022). Held hostage in the 21st century: Cubersecurity, ransomware, and crisis management (A) (UVA-OB-1392). Darden

Business Publishing.

Les avantages d'acheter des résumés chez Stuvia:

Qualité garantie par les avis des clients

Qualité garantie par les avis des clients

Les clients de Stuvia ont évalués plus de 700 000 résumés. C'est comme ça que vous savez que vous achetez les meilleurs documents.

L’achat facile et rapide

L’achat facile et rapide

Vous pouvez payer rapidement avec iDeal, carte de crédit ou Stuvia-crédit pour les résumés. Il n'y a pas d'adhésion nécessaire.

Focus sur l’essentiel

Focus sur l’essentiel

Vos camarades écrivent eux-mêmes les notes d’étude, c’est pourquoi les documents sont toujours fiables et à jour. Cela garantit que vous arrivez rapidement au coeur du matériel.

Foire aux questions

Qu'est-ce que j'obtiens en achetant ce document ?

Vous obtenez un PDF, disponible immédiatement après votre achat. Le document acheté est accessible à tout moment, n'importe où et indéfiniment via votre profil.

Garantie de remboursement : comment ça marche ?

Notre garantie de satisfaction garantit que vous trouverez toujours un document d'étude qui vous convient. Vous remplissez un formulaire et notre équipe du service client s'occupe du reste.

Auprès de qui est-ce que j'achète ce résumé ?

Stuvia est une place de marché. Alors, vous n'achetez donc pas ce document chez nous, mais auprès du vendeur solutions. Stuvia facilite les paiements au vendeur.

Est-ce que j'aurai un abonnement?

Non, vous n'achetez ce résumé que pour €17,76. Vous n'êtes lié à rien après votre achat.

Peut-on faire confiance à Stuvia ?

4.6 étoiles sur Google & Trustpilot (+1000 avis)

78998 résumés ont été vendus ces 30 derniers jours

Fondée en 2010, la référence pour acheter des résumés depuis déjà 14 ans

Commencez à vendre!

Récemment vu par vous


€17,76
  • (0)
  Ajouter