Wal-Mart is experimenting with new and valuable applications for RFID technology. They are
working to tag perishable items. The tags would inform Wal-Mart grocery and produce managers
of how long a crate bananas, for example, has been transit. The manager
At the end of its first year, 300 suppliers were feeding RFID tagged goods to 500 Wal-Mart
facilities through fie distribution centers. This number is expected to double over the next year.
Wal-Mart is experiencing impressive results with its new system.
Wal-Mart Stores Manage Supply Chain with RFID
Wal-Mart has a reputation for squeezing as much as possible out of every Dollar. Information
management and efficient management of its supply chain have been key to the companys
success. When Wal-Mart managem
1. Who are the victims in the Sniper mail case?
2. Do you think eight years is an appropriate sentence for this CEO? Why or why not?
Critical Thinking Questions
1. What actions could Acxiom have taken to prevent its customers and thei
Neither the internet or Cyberspace will ever be a safe haven for individuals who attempts this
type of Cyber crime. The Secret Service, along with our law enforcement partners, will hunt you
down, keystroke by keystroke, until you face a jury of your peer
It isnt easy to download 8.2 GB of private valuable data without being noticed. Acxiom
discovered the theft and it wasnt long before investigators traced the digital footprints to Sniper
On July 22, 2004, the CEO of Sniper mail was charged with the
Seizing the opportunity, associates at Sniper mail used their limited access to Acxiom system and
sophisticated decryption software to illegally obtain passwords to access the entire Acxiom
database. Over time, those associates downloaded more than 1 bill
Sniper mail contracted with a client that used Acxiom Corporations services. Acxiom, with head
quarters in Little Rock, Arkansas, manages personal information on consumers, along with
financial and corporate data for a variety of companies, including Fort
ETHICAL AND SOCIETAL ISSUES (50 questions)
Sniper mail Executive Serves Hard Time
When you picture a criminal hacker, you probably think of a young, socially-isolated deviant in a
dark room tapping away at the key-board in the middle of the night. You pro