Q1. Assume there is a data breach at N26, the online bank in the scenario above. Identify and explain the ethical considerations for Information Systems managers and for the company Q2. Perform an ethical analysis of the data breach incident using the five-step process you have studied in your MIS class (CIS 5311). How should the company handle the data breach?

Principles Of Marketing
17th Edition
ISBN:9780134492513
Author:Kotler, Philip, Armstrong, Gary (gary M.)
Publisher:Kotler, Philip, Armstrong, Gary (gary M.)
Chapter1: Marketing: Creating Customer Value And Engagement
Section: Chapter Questions
Problem 1.1DQ
icon
Related questions
Question

N26, a mobile bank, was founded in 2013 by Valentin Stalf and Maximilian Tayenthal. Since its launch, N26 has built a network of more than 5 mil- lion customers in 24 European countries. In 2019, N26 began operation in the United States in partnership with Axos Bank, and in 2020 it applied for a banking license in Brazil. In total, N26 has raised close to $800 million from investors and, with a market value of $3.5 billion as of May 2020, it is one of the most valuable and well-funded fintech startups in Europe.

Traditional banks typically employ a distributed IT landscape. Banks usually operate numerous self-developed software applications, but many of these are only partially adaptable to changing processes and needs. An online bank, however, has the scope to optimally design its IT landscape and customer inter- action processes based on current needs-such as compatibility with a mobile app-without having to take legacy systems into consideration. N26 is one of the few fintech banks that is hosted entirely in the cloud on a single system. N26 is able to take advantage of a modern technology stack and has over 100 microservices running in production in different software languages and frame- works. For instance, in connection with its expansion into the United States and Brazil, N26 software engineers introduced a new layer for the configuration of geographic regions into their software application and infrastructure architecture. In the modern mobile economy, this can be an important competitive advantage.

Stalf and Tayenthal conceived N26 as offering simple and customer-centric processes that could be used anywhere in the world. All of the bank's processes can be carried out completely online, from identification via video chat to opening an account. In its advertising, N26 boasts that an account can be opened within 8 minutes. And N26 aims to grow further: the number of customers world- wide was expected to double in 2020 from 5 to 10 million, with COVID-19 hastening the adoption of digital banking. N26 has responded by accelerating the development of various new features, such as an instant banking feature that allows customers to add a digital version of a new card to their mobile wallet, giving them immediate access to contactless payments.

N26 previously introduced Cash26 to further improve their services in cash- based operations. This service allows customers to deposit or withdraw cash at checkout across a network of partner companies: the N26 app generates a bar- code that controls the withdrawal or deposit, and this is simply scanned at the partner company's checkout to complete the transaction.

Banks have always been an attractive target for criminals, and their IT systems get more than their fair share of cyberattacks. N26 is investing heavily in the development of security systems, including the use of artificial intelligence, to combat phishing, a common problem in online banking, as well as other forms of cyberattack. It has also increased the number of customer service personnel to over 600 people in order to be able to offer better customer support. It expects to operate at a break-even level by the end of 2021.                                                        

Q1. Assume there is a data breach at N26, the online bank in the scenario above. Identify and explain the ethical considerations for Information Systems managers and for the company

Q2. Perform an ethical analysis of the data breach incident using the five-step process you have studied in your MIS class (CIS 5311). How should the company handle the data breach?

Expert Solution
trending now

Trending now

This is a popular solution!

steps

Step by step

Solved in 5 steps

Blurred answer
Knowledge Booster
Internet
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, marketing and related others by exploring similar questions and additional content below.
Similar questions
  • SEE MORE QUESTIONS
Recommended textbooks for you
Principles Of Marketing
Principles Of Marketing
Marketing
ISBN:
9780134492513
Author:
Kotler, Philip, Armstrong, Gary (gary M.)
Publisher:
Pearson Higher Education,
Marketing
Marketing
Marketing
ISBN:
9781259924040
Author:
Roger A. Kerin, Steven W. Hartley
Publisher:
McGraw-Hill Education
Foundations of Business (MindTap Course List)
Foundations of Business (MindTap Course List)
Marketing
ISBN:
9781337386920
Author:
William M. Pride, Robert J. Hughes, Jack R. Kapoor
Publisher:
Cengage Learning
Marketing: An Introduction (13th Edition)
Marketing: An Introduction (13th Edition)
Marketing
ISBN:
9780134149530
Author:
Gary Armstrong, Philip Kotler
Publisher:
PEARSON
MKTG 12:STUDENT ED.-TEXT
MKTG 12:STUDENT ED.-TEXT
Marketing
ISBN:
9781337407595
Author:
Lamb
Publisher:
Cengage
Contemporary Marketing
Contemporary Marketing
Marketing
ISBN:
9780357033777
Author:
Louis E. Boone, David L. Kurtz
Publisher:
Cengage Learning