×




Target Data Breach: Accounting for Contingent Liabilities SWOT Analysis / TOWS Matrix / Weighted SWOT Analysis

Case Study SWOT Analysis Solution

Case Study Description of Target Data Breach: Accounting for Contingent Liabilities


This is a flexible case that provides for discussion about the form and content of 10-K reports, managerial discussion and analysis, non-GAAP reporting, and accounting for contingent liabilities. What is unique is that Target included lengthy disclosures about the data breach, but many questions remain because the breach occurred shortly before year end. Further, the instructor can compare the contingent liability of $17 million reported in the 2013 10-K to the $201 million costs incurred by Target related to the breach as of the 2015 year end.

Authors :: Justin J. Hopkins

Topics :: Finance & Accounting

Tags :: Security & privacy, SWOT Analysis, SWOT Matrix, TOWS, Weighted SWOT Analysis

Swot Analysis of "Target Data Breach: Accounting for Contingent Liabilities" written by Justin J. Hopkins includes – strengths weakness that are internal strategic factors of the organization, and opportunities and threats that Breach Contingent facing as an external strategic factors. Some of the topics covered in Target Data Breach: Accounting for Contingent Liabilities case study are - Strategic Management Strategies, Security & privacy and Finance & Accounting.


Some of the macro environment factors that can be used to understand the Target Data Breach: Accounting for Contingent Liabilities casestudy better are - – customer relationship management is fast transforming because of increasing concerns over data privacy, there is backlash against globalization, increasing household debt because of falling income levels, increasing commodity prices, technology disruption, banking and financial system is disrupted by Bitcoin and other crypto currencies, challanges to central banks by blockchain based private currencies, geopolitical disruptions, supply chains are disrupted by pandemic , etc



12 Hrs

$59.99
per Page
  • 100% Plagiarism Free
  • On Time Delivery | 27x7
  • PayPal Secure
  • 300 Words / Page
  • Buy Now

24 Hrs

$49.99
per Page
  • 100% Plagiarism Free
  • On Time Delivery | 27x7
  • PayPal Secure
  • 300 Words / Page
  • Buy Now

48 Hrs

$39.99
per Page
  • 100% Plagiarism Free
  • On Time Delivery | 27x7
  • PayPal Secure
  • 300 Words / Page
  • Buy Now







Introduction to SWOT Analysis of Target Data Breach: Accounting for Contingent Liabilities


SWOT stands for an organization’s Strengths, Weaknesses, Opportunities and Threats . At Oak Spring University , we believe that protagonist in Target Data Breach: Accounting for Contingent Liabilities case study can use SWOT analysis as a strategic management tool to assess the current internal strengths and weaknesses of the Breach Contingent, and to figure out the opportunities and threats in the macro environment – technological, environmental, political, economic, social, demographic, etc in which Breach Contingent operates in.

According to Harvard Business Review, 75% of the managers use SWOT analysis for various purposes such as – evaluating current scenario, strategic planning, new venture feasibility, personal growth goals, new market entry, Go To market strategies, portfolio management and strategic trade-off assessment, organizational restructuring, etc.




SWOT Objectives / Importance of SWOT Analysis and SWOT Matrix


SWOT analysis of Target Data Breach: Accounting for Contingent Liabilities can be done for the following purposes –
1. Strategic planning using facts provided in Target Data Breach: Accounting for Contingent Liabilities case study
2. Improving business portfolio management of Breach Contingent
3. Assessing feasibility of the new initiative in Finance & Accounting field.
4. Making a Finance & Accounting topic specific business decision
5. Set goals for the organization
6. Organizational restructuring of Breach Contingent




Strengths Target Data Breach: Accounting for Contingent Liabilities | Internal Strategic Factors
What are Strengths in SWOT Analysis / TOWS Matrix / Weighted SWOT Analysis

The strengths of Breach Contingent in Target Data Breach: Accounting for Contingent Liabilities Harvard Business Review case study are -

Highly skilled collaborators

– Breach Contingent has highly efficient outsourcing and offshoring strategy. It has resulted in greater operational flexibility and bringing down the costs in highly price sensitive segment. Secondly the value chain collaborators of the firm in Target Data Breach: Accounting for Contingent Liabilities HBR case study have helped the firm to develop new products and bring them quickly to the marketplace.

Training and development

– Breach Contingent has one of the best training and development program in the industry. The effectiveness of the training programs can be measured in Target Data Breach: Accounting for Contingent Liabilities Harvard Business Review case study by analyzing – employees retention, in-house promotion, loyalty, new venture initiation, lack of conflict, and high level of both employees and customer engagement.

Ability to recruit top talent

– Breach Contingent is one of the leading recruiters in the industry. Managers in the Target Data Breach: Accounting for Contingent Liabilities are in a position to attract the best talent available. The firm has a robust talent identification program that helps in identifying the brightest.

Successful track record of launching new products

– Breach Contingent has launched numerous new products in last few years, keeping in mind evolving customer preferences and competitive pressures. Breach Contingent has effective processes in place that helps in exploring new product needs, doing quick pilot testing, and then launching the products quickly using its extensive distribution network.

Innovation driven organization

– Breach Contingent is one of the most innovative firm in sector. Manager in Target Data Breach: Accounting for Contingent Liabilities Harvard Business Review case study can use Clayton Christensen Disruptive Innovation strategies to further increase the scale of innovtions in the organization.

Effective Research and Development (R&D)

– Breach Contingent has innovation driven culture where significant part of the revenues are spent on the research and development activities. This has resulted in, as mentioned in case study Target Data Breach: Accounting for Contingent Liabilities - staying ahead in the industry in terms of – new product launches, superior customer experience, highly competitive pricing strategies, and great returns to the shareholders.

Ability to lead change in Finance & Accounting field

– Breach Contingent is one of the leading players in its industry. Over the years it has not only transformed the business landscape in its segment but also across the whole industry. The ability to lead change has enabled Breach Contingent in – penetrating new markets, reaching out to new customers, and providing different value propositions to different customers in the international markets.

Learning organization

- Breach Contingent is a learning organization. It has inculcated three key characters of learning organization in its processes and operations – exploration, creativity, and expansiveness. The work place at Breach Contingent is open place that encourages instructiveness, ideation, open minded discussions, and creativity. Employees and leaders in Target Data Breach: Accounting for Contingent Liabilities Harvard Business Review case study emphasize – knowledge, initiative, and innovation.

Analytics focus

– Breach Contingent is putting a lot of focus on utilizing the power of analytics in business decision making. This has put it among the leading players in the industry. The technology infrastructure suggested by Justin J. Hopkins can also help it to harness the power of analytics for – marketing optimization, demand forecasting, customer relationship management, inventory management, information sharing across the value chain etc.

Strong track record of project management

– Breach Contingent is known for sticking to its project targets. This enables the firm to manage – time, project costs, and have sustainable margins on the projects.

Superior customer experience

– The customer experience strategy of Breach Contingent in the segment is based on four key concepts – personalization, simplification of complex needs, prompt response, and continuous engagement.

Cross disciplinary teams

– Horizontal connected teams at the Breach Contingent are driving operational speed, building greater agility, and keeping the organization nimble to compete with new competitors. It helps are organization to ideate new ideas, and execute them swiftly in the marketplace.






Weaknesses Target Data Breach: Accounting for Contingent Liabilities | Internal Strategic Factors
What are Weaknesses in SWOT Analysis / TOWS Matrix / Weighted SWOT Analysis

The weaknesses of Target Data Breach: Accounting for Contingent Liabilities are -

Interest costs

– Compare to the competition, Breach Contingent has borrowed money from the capital market at higher rates. It needs to restructure the interest payment and costs so that it can compete better and improve profitability.

Ability to respond to the competition

– As the decision making is very deliberative, highlighted in the case study Target Data Breach: Accounting for Contingent Liabilities, in the dynamic environment Breach Contingent has struggled to respond to the nimble upstart competition. Breach Contingent has reasonably good record with similar level competitors but it has struggled with new entrants taking away niches of its business.

Capital Spending Reduction

– Even during the low interest decade, Breach Contingent has not been able to do capital spending to the tune of the competition. This has resulted into fewer innovations and company facing stiff competition from both existing competitors and new entrants who are disrupting the industry using digital technology.

Slow decision making process

– As mentioned earlier in the report, Breach Contingent has a very deliberative decision making approach. This approach has resulted in prudent decisions, but it has also resulted in missing opportunities in the industry over the last five years. Breach Contingent even though has strong showing on digital transformation primary two stages, it has struggled to capitalize the power of digital transformation in marketing efforts and new venture efforts.

Need for greater diversity

– Breach Contingent has taken concrete steps on diversity, equity, and inclusion. But the efforts so far has resulted in limited success. It needs to expand the recruitment and selection process to hire more people from the minorities and underprivileged background.

High operating costs

– Compare to the competitors, firm in the HBR case study Target Data Breach: Accounting for Contingent Liabilities has high operating costs in the. This can be harder to sustain given the new emerging competition from nimble players who are using technology to attract Breach Contingent 's lucrative customers.

Employees’ incomplete understanding of strategy

– From the instances in the HBR case study Target Data Breach: Accounting for Contingent Liabilities, it seems that the employees of Breach Contingent don’t have comprehensive understanding of the firm’s strategy. This is reflected in number of promotional campaigns over the last few years that had mixed messaging and competing priorities. Some of the strategic activities and services promoted in the promotional campaigns were not consistent with the organization’s strategy.

Slow to strategic competitive environment developments

– As Target Data Breach: Accounting for Contingent Liabilities HBR case study mentions - Breach Contingent takes time to assess the upcoming competitions. This has led to missing out on atleast 2-3 big opportunities in the industry in last five years.

Skills based hiring

– The stress on hiring functional specialists at Breach Contingent has created an environment where the organization is dominated by functional specialists rather than management generalist. This has resulted into product oriented approach rather than marketing oriented approach or consumers oriented approach.

Lack of clear differentiation of Breach Contingent products

– To increase the profitability and margins on the products, Breach Contingent needs to provide more differentiated products than what it is currently offering in the marketplace.

Compensation and incentives

– The revenue per employee as mentioned in the HBR case study Target Data Breach: Accounting for Contingent Liabilities, is just above the industry average. Breach Contingent needs to redesign the compensation structure and incentives to increase the revenue per employees. Some of the steps that it can take are – hiring more specialists on project basis, etc.




Opportunities Target Data Breach: Accounting for Contingent Liabilities | External Strategic Factors
What are Opportunities in the SWOT Analysis / TOWS Matrix / Weighted SWOT Analysis


The opportunities highlighted in the Harvard Business Review case study Target Data Breach: Accounting for Contingent Liabilities are -

Increase in government spending

– As the United States and other governments are increasing social spending and infrastructure spending to build economies post Covid-19, Breach Contingent can use these opportunities to build new business models that can help the communities that Breach Contingent operates in. Secondly it can use opportunities from government spending in Finance & Accounting sector.

Changes in consumer behavior post Covid-19

– Consumer behavior has changed in the Finance & Accounting industry because of Covid-19 restrictions. Some of this behavior will stay once things get back to normal. Breach Contingent can take advantage of these changes in consumer behavior to build a far more efficient business model. For example consumer regular ordering of products can reduce both last mile delivery costs and market penetration costs. Breach Contingent can further use this consumer data to build better customer loyalty, provide better products and service collection, and improve the value proposition in inflationary times.

Learning at scale

– Online learning technologies has now opened space for Breach Contingent to conduct training and development for its employees across the world. This will result in not only reducing the cost of training but also help employees in different part of the world to integrate with the headquarter work culture, ethos, and standards.

Reconfiguring business model

– The expansion of digital payment system, the bringing down of international transactions costs using Bitcoin and other blockchain based currencies, etc can help Breach Contingent to reconfigure its entire business model. For example it can used blockchain based technologies to reduce piracy of its products in the big markets such as China. Secondly it can use the popularity of e-commerce in various developing markets to build a Direct to Customer business model rather than the current Channel Heavy distribution network.

Loyalty marketing

– Breach Contingent has focused on building a highly responsive customer relationship management platform. This platform is built on in-house data and driven by analytics and artificial intelligence. The customer analytics can help the organization to fine tune its loyalty marketing efforts, increase the wallet share of the organization, reduce wastage on mainstream advertising spending, build better pricing strategies using personalization, etc.

Use of Bitcoin and other crypto currencies for transactions

– The popularity of Bitcoin and other crypto currencies as asset class and medium of transaction has opened new opportunities for Breach Contingent in the consumer business. Now Breach Contingent can target international markets with far fewer capital restrictions requirements than the existing system.

Buying journey improvements

– Breach Contingent can improve the customer journey of consumers in the industry by using analytics and artificial intelligence. Target Data Breach: Accounting for Contingent Liabilities suggest that firm can provide automated chats to help consumers solve their own problems, provide online suggestions to get maximum out of the products and services, and help consumers to build a community where they can interact with each other to develop new features and uses.

Remote work and new talent hiring opportunities

– The widespread usage of remote working technologies during Covid-19 has opened opportunities for Breach Contingent to expand its talent hiring zone. According to McKinsey Global Institute, 20% of the high end workforce in fields such as finance, information technology, can continously work from remote local post Covid-19. This presents a really great opportunity for Breach Contingent to hire the very best people irrespective of their geographical location.

Redefining models of collaboration and team work

– As explained in the weaknesses section, Breach Contingent is facing challenges because of the dominance of functional experts in the organization. Target Data Breach: Accounting for Contingent Liabilities case study suggests that firm can utilize new technology to build more coordinated teams and streamline operations and communications using tools such as CAD, Zoom, etc.

Lowering marketing communication costs

– 5G expansion will open new opportunities for Breach Contingent in the field of marketing communication. It will bring down the cost of doing business, provide technology platform to build new products in the Finance & Accounting segment, and it will provide faster access to the consumers.

Developing new processes and practices

– Breach Contingent can develop new processes and procedures in Finance & Accounting industry using technology such as automation using artificial intelligence, real time transportation and products tracking, 3D modeling for concept development and new products pilot testing etc.

Using analytics as competitive advantage

– Breach Contingent has spent a significant amount of money and effort to integrate analytics and machine learning into its operations in the sector. This continuous investment in analytics has enabled, as illustrated in the Harvard case study Target Data Breach: Accounting for Contingent Liabilities - to build a competitive advantage using analytics. The analytics driven competitive advantage can help Breach Contingent to build faster Go To Market strategies, better consumer insights, developing relevant product features, and building a highly efficient supply chain.

Better consumer reach

– The expansion of the 5G network will help Breach Contingent to increase its market reach. Breach Contingent will be able to reach out to new customers. Secondly 5G will also provide technology framework to build new tools and products that can help more immersive consumer experience and faster consumer journey.




Threats Target Data Breach: Accounting for Contingent Liabilities External Strategic Factors
What are Threats in the SWOT Analysis / TOWS Matrix / Weighted SWOT Analysis


The threats mentioned in the HBR case study Target Data Breach: Accounting for Contingent Liabilities are -

Increasing international competition and downward pressure on margins

– Apart from technology driven competitive advantage dilution, Breach Contingent can face downward pressure on margins from increasing competition from international players. The international players have stable revenue in their home market and can use those resources to penetrate prominent markets illustrated in HBR case study Target Data Breach: Accounting for Contingent Liabilities .

Instability in the European markets

– European Union markets are facing three big challenges post Covid – expanded balance sheets, Brexit related business disruption, and aggressive Russia looking to distract the existing security mechanism. Breach Contingent will face different problems in different parts of Europe. For example it will face inflationary pressures in UK, France, and Germany, balance sheet expansion and demand challenges in Southern European countries, and geopolitical instability in the Eastern Europe.

Consumer confidence and its impact on Breach Contingent demand

– There is a high probability of declining consumer confidence, given – high inflammation rate, rise of gig economy, lower job stability, increasing cost of living, higher interest rates, and aging demography. All the factors contribute to people saving higher rate of their income, resulting in lower consumer demand in the industry and other sectors.

New competition

– After the dotcom bust of 2001, financial crisis of 2008-09, the business formation in US economy had declined. But in 2020 alone, there are more than 1.5 million new business applications in United States. This can lead to greater competition for Breach Contingent in the Finance & Accounting sector and impact the bottomline of the organization.

Barriers of entry lowering

– As technology is more democratized, the barriers to entry in the industry are lowering. It can presents Breach Contingent with greater competitive threats in the near to medium future. Secondly it will also put downward pressure on pricing throughout the sector.

Capital market disruption

– During the Covid-19, Dow Jones has touched record high. The valuations of a number of companies are way beyond their existing business model potential. This can lead to capital market correction which can put a number of suppliers, collaborators, value chain partners in great financial difficulty. It will directly impact the business of Breach Contingent.

Learning curve for new practices

– As the technology based on artificial intelligence and machine learning platform is getting complex, as highlighted in case study Target Data Breach: Accounting for Contingent Liabilities, Breach Contingent may face longer learning curve for training and development of existing employees. This can open space for more nimble competitors in the field of Finance & Accounting .

High level of anxiety and lack of motivation

– the Great Resignation in United States is the sign of broader dissatisfaction among the workforce in United States. Breach Contingent needs to understand the core reasons impacting the Finance & Accounting industry. This will help it in building a better workplace.

Technology acceleration in Forth Industrial Revolution

– Breach Contingent has witnessed rapid integration of technology during Covid-19 in the Finance & Accounting industry. As one of the leading players in the industry, Breach Contingent needs to keep up with the evolution of technology in the Finance & Accounting sector. According to Mckinsey study top managers believe that the adoption of technology in operations, communications is 20-25 times faster than what they planned in the beginning of 2019.

Increasing wage structure of Breach Contingent

– Post Covid-19 there is a sharp increase in the wages especially in the jobs that require interaction with people. The increasing wages can put downward pressure on the margins of Breach Contingent.

High dependence on third party suppliers

– Breach Contingent high dependence on third party suppliers can disrupt its processes and delivery mechanism. For example -the current troubles of car makers because of chip shortage is because the chip companies started producing chips for electronic companies rather than car manufacturers.

Shortening product life cycle

– it is one of the major threat that Breach Contingent is facing in Finance & Accounting sector. It can lead to higher research and development costs, higher marketing expenses, lower customer loyalty, etc.

Technology disruption because of hacks, piracy etc

– The colonial pipeline illustrated, how vulnerable modern organization are to international hackers, miscreants, and disruptors. The cyber security interruption, data leaks, etc can seriously jeopardize the future growth of the organization.




Weighted SWOT Analysis of Target Data Breach: Accounting for Contingent Liabilities Template, Example


Not all factors mentioned under the Strengths, Weakness, Opportunities, and Threats quadrants in the SWOT Analysis are equal. Managers in the HBR case study Target Data Breach: Accounting for Contingent Liabilities needs to zero down on the relative importance of each factor mentioned in the Strengths, Weakness, Opportunities, and Threats quadrants. We can provide the relative importance to each factor by assigning relative weights. Weighted SWOT analysis process is a three stage process –

First stage for doing weighted SWOT analysis of the case study Target Data Breach: Accounting for Contingent Liabilities is to rank the strengths and weaknesses of the organization. This will help you to assess the most important strengths and weaknesses of the firm and which one of the strengths and weaknesses mentioned in the initial lists are marginal and can be left out.

Second stage for conducting weighted SWOT analysis of the Harvard case study Target Data Breach: Accounting for Contingent Liabilities is to give probabilities to the external strategic factors thus better understanding the opportunities and threats arising out of macro environment changes and developments.

Third stage of constructing weighted SWOT analysis of Target Data Breach: Accounting for Contingent Liabilities is to provide strategic recommendations includes – joining likelihood of external strategic factors such as opportunities and threats to the internal strategic factors – strengths and weaknesses. You should start with external factors as they will provide the direction of the overall industry. Secondly by joining probabilities with internal strategic factors can help the company not only strategic fit but also the most probably strategic trade-off that Breach Contingent needs to make to build a sustainable competitive advantage.



--- ---

Intel: Exploring Market Opportunities in Water SWOT Analysis / TOWS Matrix

Robert G. Eccles, Amy C. Edmondson, George Serafeim, Sarah E. Farrell , Innovation & Entrepreneurship


Innovation at the Leading Hotels of the World SWOT Analysis / TOWS Matrix

Mona Anita K. Olsen, Saniya Ghandi, Kelly McDarby, Joanne Jihwan Park , Leadership & Managing People


Guaranty Trust Bank PLC Nigeria (D) SWOT Analysis / TOWS Matrix

Harold F. Hogan Jr. , Leadership & Managing People


Le Moulin Blanc SWOT Analysis / TOWS Matrix

Zsuzsanna Kispal-Vitai , Leadership & Managing People


SunLife's Maestro SWOT Analysis / TOWS Matrix

Sid L. Huff, Jennifer McNaughton , Technology & Operations