Overview of Target Services and the Data Breach

2623 Words6 Pages

Retail Background

All businesses that sell goods and services to consumers fall under the umbrella of retailing, but there are numerous distinctions we can take from here. To begin with, there are department stores, discount stores, specialty stores and even seasonal retailers. In some parts of the world, the retail business is dominated by smaller family-run or regionally-targeted stores, but this market is increasingly being taken over by billion-dollar multinational conglomerates like Wal-Mart and Target. The larger retailers have managed to set up huge supply/distribution chains, inventory management systems, financing pacts and wide scale marketing plans. Each retailer tries to differentiate itself from the competition, but the strategy that the company uses to sell its products is the most important factor.

Department stores are very large stores offering a huge assortment of goods and services. Discounter’s stores also tend to offer a wide array of products and services, but they compete mainly on price. Demographic are retailers that aim at one particular segment like high-end retailers focusing on wealthy individuals. During tough economic times, the discount retailers tend to outperform the others. The opposite is true when the economy is thriving. The more successful retailers attempt to combine the characteristics of more than one type of retailer to differentiate themselves from the competition. The profitability of individual companies depends on high volume sales, low-cost purchasing, and efficient distribution. Large chains dominate the market due to advantages in purchasing, distribution, and finance. The US industry is highly concentrated: the top four companies account for more than 90 percent of revenue. R...

... middle of paper ...

...485/ns/technology_and_science-security/t/tj-maxx-theft-believed-largest-hack-ever/#.U2Q3O16ppuY>.

Advertising Age, July 5, 1993, p. S18.Grant, Linda, and Warren Cohen

"Shopping's Big Chill," U.S. News & World Report, July 12, 1993

"Target confirms encrypted PIN data stolen." USA Today. Retrieved on December 27, 2013

"Fact Sheet: Quick Facts About Target | Target Corporate". Pressroom.target.com. Retrieved 2014-01-19.

Esbensen, Daniel. "Method and apparatus for automated network-wide surveillance and security breach intervention." U.S. Patent No. 5,796,942. 18 Aug. 1998.

Vijayan, Jaikumar. "Target breach happened because of a basic network segmentation error." www.computerworld.com. Computerworld Inc., 06 Feburary 2014. Web. 24 Mar 2014. .

More about Overview of Target Services and the Data Breach

Open Document