Internet Vigilantism and Ashley Madison: Rebranding After a Cyberattack

ISBN-10
1526438348
ISBN-13
9781526438348
Category
Branding (Marketing)
Language
English
Published
2018
Authors
Karen Robson, Leyland F. Pitt

Description

Avid Life Media was the parent company of a number of dating websites, including Ashley Madison, a dating website for married people seeking affairs. In July 2015, the dating website suffered a massive cyberattack by a group of hackers that resulted in the user data and personal information of nearly 37 million users being publicized. In the aftermath of the attack, Avid Life Media and Ashley Madison have undergone a number of changes in an effort to rebuild and rebrand. This case explores the Ashley Madison brand and the crisis that ensued after the cyberattack. The case encourages students to consider how to approach a complicated business situation involving ethics, customer privacy, cybersecurity, public relations, and rebranding.

Similar books

  • Cybersecurity Readiness: A Holistic and High-Performance Approach
    By Dave Chatterjee

    Avid Life Media was the parent company of a number of dating websites, including Ashley Madison, a dating website for ... the dating service Ashley Madison; delve into the ethical complexities of internet vigilantism as demonstrated by ...

  • Chasing Masculinity: Men, Validation, and Infidelity
    By Alicia M. Walker

    Tucker (60, married) articulated his situation: “My wife is my best friend. Close. Very easy to be affectionate. We have similar goals, are both very busy people. I credit my current OP [outside partnership] for saving my marriage.

  • Data Privacy and GDPR Handbook
    By Sanjay Sharma

    Most ironically, it was Ashley Madison's own data storage policies that caused the problem to begin with, ... The Ashley Madison hack raised interesting questions about the ethical obligations of processing data, internet vigilantism, ...

  • Cybercrimes
    By Anita Lavorgna

    43–53 Boyle J (1996) Shamans, software, and spleens: law and the construction of the information society. ... Análise Psicológica 34(3):249–263 Branch K, Hilinski-Rosick CM, Johnson E & Solano G (2017) Revenge port victimization of ...

  • RIoT Control: Understanding and Managing Risks and the Internet of Things
    By Tyson Macaulay

    A few recent examples of chaotic actors and vigilantes in the IoT specifically, and the Internet generally: • German ... property exposed4 • Ashley Madison—millions of individual identities exposed for no clear motivation or benefits, ...

  • The SAGE Handbook of Social Media
    By Thomas Poell, Jean Burgess, Alice Marwick

    He has published widely on mobile and location-based media. He is the co-editor (with Justin ... and Place (Routledge, 2012), and is the author of Teletechnologies, Place, and Community (Routledge, 2011). At present he is working on two ...

  • Ethics in an Age of Surveillance: Personal Information and Virtual Identities
    By Adam Henschke

    “Ashley Madison: An Affair May Be Morally Wrong, But Can We Justify Vigilante Punishment Based on Sexual Morality?” The Age, 20th August. www ... “The Internet of Things and Dual Layers of Ethical Concern.” In Robot Ethics, edited by ...

  • Proceedings of the Tenth International Conference on Soft Computing and Pattern Recognition (SoCPaR 2018)
    By Ajith Abraham, Ana Maria Madureira, Niketa Gandhi

    ACM, New York (2018) Malm, S.: Two suicides are linked to Ashley Madison leak: Texas police chief takes his own life just days after his email is leaked in ... In: Proceedings of the 2016 Internet Measurement Conference, IMC 2016, pp.

  • Cyberspace, Cybersecurity, and Cybercrime
    By Janine Kremling, Amanda M. Sharp Parker

    Highlighting the latest empirical research findings and challenges that cybercrime and cybersecurity pose for those working in the field of criminal justice, this book exposes critical issues related to privacy, terrorism, hacktivism, the ...

  • Securing Social Networks in Cyberspace
    By Al-Sakib Khan Pathan

    Ashley Madison is a dating stage for individuals looking for extramarital undertakings, and the hole, in a real sense, destroyed a few families. We should always concentrate on our usage of the internet and try to help our family ...