Limitations of existing communication processes

Assignment Help Computer Engineering
Reference no: EM132859283

Unit: Managing Business Information

Scenario

On September 6th, Thursday, AXION Airways announced it had suffered a breach resulting in the theft of customer data. In interviews with the TV24, the company noted that around 380,000 customers could have been affected and that the stolen information included personal and payment information but not passport information. The organisation also stated very clearly that information was stolen from the AXION Airways website and mobile app. Shares of AXION Airways' parent company AAG fell around 4% as markets opened on Friday morning, hours after the airline said that their customer information "compromised" in a data theft. The company's chairman and chief executive, Alex Cruz, said: "We are deeply sorry for the disruption that this criminal activity has caused." Speaking to TV24News, he said the online vulnerability had now been fixed after it was discovered on Wednesday and indicated compensation could be a possibility for anyone who had lost money.

Despite AXION's quick reporting of the breach, experts think the airline could be hit by a huge fine under the GDPR, which came into place on May 25. Previously, the largest fine issued by the Information Commissioner's Office (ICO) was £500,000. If the airline's parent group AAG is held accountable instead, the number could be even higher.

As a measurement to improve their services AXION Airways has decided to train all their employees on managing business information. You work as an IT operations manager and you are asked to conduct several training sessions to upskill all the employees with the current best practices.

Task 1 - Presentation and speaker notes

You have decided to start the training with a presentation.

Instructions

a. You start your presentation by summarising the typical business decisions made by AXION Airways.
b. Provide an assessment of the internal and external sources of information required.
c. You conclude the presentation by providing an evaluation of the information and knowledge needed to ensure effective decision making.

Task 2 -Report

Your following task is to create an overarching report considering the data breach. You have planned to do the following:

Instructions

Your report will consist of two parts.

a. In the first part, make the readers aware of the communication processes used in AXION Airways by reporting on existing processes of communication in British Airways.
b. Determine the benefits and limitations of existing communication processes.
c. Using the case scenario of confidential data breach, justify areas of improvement for communication processes.

d. In the second part, report on existing approaches to the collection, formatting, storage and dissemination of information and knowledge in AXION Airways.
e. Recommend a strategy to improve the collection, formatting, storage and dissemination of information and knowledge in AXION Airways.
f. Provide a commentary on how you would have implemented an improvement to access of information and knowledge in an organisation.

Reference no: EM132859283

Questions Cloud

Brief introduction and background of coca-cola : Write a brief introduction and background of coca-cola Amatil and compare it with Hard-Rock cafe.
Geert hofstede six cultural dimensions : You are a manager for a global expansion project in an organization.
Describe common algorithmic techniques and solutions : Explain the concept of an algorithm and describe common algorithmic techniques and solutions - explain how objects are used in Object-oriented programming
Canadian ethical standards in a culture : As a senior manager operating in another country, how should you enforce Canadian ethical standards in a culture that has different standards?
Limitations of existing communication processes : Determine the benefits and limitations of existing communication processes and Provide a commentary on how you would have implemented an improvement to access
Evaluation of the software development techniques : Software Development - Explanation of the importance of each stage in traditional software lifecycle approaches - Evaluation of the software development
Importance of strategic resources and competencies : What is the importance of strategic resources and competencies?
Formulate a precise research problem : You want to understand consumer behavior towards usage of mobile telephones through a survey.
How to assemble modern computer components : Demonstrate how to assemble modern computer components to make a clone PC - Troubleshoot at least 5 Windows/ Unix/ MacOS/ Linux OS errors in a laboratory

Reviews

Write a Review

Computer Engineering Questions & Answers

  How to calculate subnets

How to calculate subnets, and be sure to include enough detail that the steps would make sense to someone who doesn't already know how to calculate subnets.

  How would you argue against the inevitable tendency

A simulated disaster and comprehensive recovery test may involve many of an organization's key personnel for several days: is this a reasonable burden to place.

  Identify the recommended design approach

The stakeholders at WeLoveVideo, Inc. are interested in understanding what the CRM will look like prior to development. There are a variety of ways the project.

  Describe different uses of the tools besides cryptography

In this module, you learned that random numbers (or, at least, pseudorandom numbers) are essential in cryptography, but it is extremely difficult even for.

  What is the factor of safety

Apply the torque at the center of the middle part where you grip the drill. Fix both the top and the bottom faces. What is the factor of safety?

  Transforming infix to reverse polish

Transform the following formulas from infix to the reverse Polish: A + B + C + D - E, (A - B) x (C +D) + E

  Create a use-case diagram to include at least three actors

Create a use-case diagram to include at least three actors for the system described in this case through the use of graphical tools in Microsoft Word or Visio.

  Describe the object-oriented databases

Describe the database planning and development process. What steps are involved, and what tools may be appropriate or helpful.

  Explain the cost model and recurrence

Explain (in README) the cost model and recurrence and prove that the algorithm operates in O(klogn).

  Compute how many seconds are in 20 years

Write a C# program to convert one billion seconds (1,000,000,000 seconds) into years, months, days, hours, minutes, and seconds, using visual studio.

  What kinds of evidence would help to support your opinion

Do you think a physical keyboard is necessary for your own computer work and creativity? What kinds of evidence would help to support your opinion?

  A program to get a string-converts that string to morse code

Write a C++ programming with class that asks the user to enter a string, and then converts that string to Morse Code.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd