學門類別
哈佛
- General Management
- Marketing
- Entrepreneurship
- International Business
- Accounting
- Finance
- Operations Management
- Strategy
- Human Resource Management
- Social Enterprise
- Business Ethics
- Organizational Behavior
- Information Technology
- Negotiation
- Business & Government Relations
- Service Management
- Sales
- Economics
- Teaching & the Case Method
最新個案
- A practical guide to SEC ï¬nancial reporting and disclosures for successful regulatory crowdfunding
- Quality shareholders versus transient investors: The alarming case of product recalls
- The Health Equity Accelerator at Boston Medical Center
- Monosha Biotech: Growth Challenges of a Social Enterprise Brand
- Assessing the Value of Unifying and De-duplicating Customer Data, Spreadsheet Supplement
- Building an AI First Snack Company: A Hands-on Generative AI Exercise, Data Supplement
- Building an AI First Snack Company: A Hands-on Generative AI Exercise
- Board Director Dilemmas: The Tradeoffs of Board Selection
- Barbie: Reviving a Cultural Icon at Mattel (Abridged)
- Happiness Capital: A Hundred-Year-Old Family Business's Quest to Create Happiness
When Hackers Turn to Blackmail (HBR Case Study and Commentary)
內容大綱
Sunnylake Hospital is being held up by online extortionists who have blocked access to its electronic medical records and are demanding $100,000 to restore it. Paul Layman, Sunnylake's CEO, didn't take their first e-mail seriously, and now the hospital has ground to a halt. Paul's golden-boy IT director can't seem to outwit the hackers. Sunnylake's legal counsel tells Paul, "Literally every second is a liability." The chief of staff is in a mutinous fury. What should Paul do? Three experts comment on this fictional case study in R0910B and R0910Z. He should pay the extortionists, advises Per Gullestrup, the CEO of Clipper Projects, who in late 2008 was closely involved in negotiations with Somali pirates who had seized a Clipper Group ship. But first Paul should hire a negotiator to prevent the extortionists from doing further mischief. He should absolutely not acquiesce, says Richard L. Nolan, a professor at the University of Washington's Michael G. Foster School of Business, because the hackers may have embedded further corruption in the system. And Paul must communicate fully with the staff, his board, patients, and the public. Peter R. Stephenson, chairman of the department of computing at Norwich University, recommends shutting down the servers, running a malware scan on every workstation in the hospital, and watching what happens for 24 hours, in case the extortionists are insiders.