Limitations of existing communication processes

Assignment Help Computer Engineering
Reference no: EM132859283

Unit: Managing Business Information

Scenario

On September 6th, Thursday, AXION Airways announced it had suffered a breach resulting in the theft of customer data. In interviews with the TV24, the company noted that around 380,000 customers could have been affected and that the stolen information included personal and payment information but not passport information. The organisation also stated very clearly that information was stolen from the AXION Airways website and mobile app. Shares of AXION Airways' parent company AAG fell around 4% as markets opened on Friday morning, hours after the airline said that their customer information "compromised" in a data theft. The company's chairman and chief executive, Alex Cruz, said: "We are deeply sorry for the disruption that this criminal activity has caused." Speaking to TV24News, he said the online vulnerability had now been fixed after it was discovered on Wednesday and indicated compensation could be a possibility for anyone who had lost money.

Despite AXION's quick reporting of the breach, experts think the airline could be hit by a huge fine under the GDPR, which came into place on May 25. Previously, the largest fine issued by the Information Commissioner's Office (ICO) was £500,000. If the airline's parent group AAG is held accountable instead, the number could be even higher.

As a measurement to improve their services AXION Airways has decided to train all their employees on managing business information. You work as an IT operations manager and you are asked to conduct several training sessions to upskill all the employees with the current best practices.

Task 1 - Presentation and speaker notes

You have decided to start the training with a presentation.

Instructions

a. You start your presentation by summarising the typical business decisions made by AXION Airways.
b. Provide an assessment of the internal and external sources of information required.
c. You conclude the presentation by providing an evaluation of the information and knowledge needed to ensure effective decision making.

Task 2 -Report

Your following task is to create an overarching report considering the data breach. You have planned to do the following:

Instructions

Your report will consist of two parts.

a. In the first part, make the readers aware of the communication processes used in AXION Airways by reporting on existing processes of communication in British Airways.
b. Determine the benefits and limitations of existing communication processes.
c. Using the case scenario of confidential data breach, justify areas of improvement for communication processes.

d. In the second part, report on existing approaches to the collection, formatting, storage and dissemination of information and knowledge in AXION Airways.
e. Recommend a strategy to improve the collection, formatting, storage and dissemination of information and knowledge in AXION Airways.
f. Provide a commentary on how you would have implemented an improvement to access of information and knowledge in an organisation.

Reference no: EM132859283

Questions Cloud

Brief introduction and background of coca-cola : Write a brief introduction and background of coca-cola Amatil and compare it with Hard-Rock cafe.
Geert hofstede six cultural dimensions : You are a manager for a global expansion project in an organization.
Describe common algorithmic techniques and solutions : Explain the concept of an algorithm and describe common algorithmic techniques and solutions - explain how objects are used in Object-oriented programming
Canadian ethical standards in a culture : As a senior manager operating in another country, how should you enforce Canadian ethical standards in a culture that has different standards?
Limitations of existing communication processes : Determine the benefits and limitations of existing communication processes and Provide a commentary on how you would have implemented an improvement to access
Evaluation of the software development techniques : Software Development - Explanation of the importance of each stage in traditional software lifecycle approaches - Evaluation of the software development
Importance of strategic resources and competencies : What is the importance of strategic resources and competencies?
Formulate a precise research problem : You want to understand consumer behavior towards usage of mobile telephones through a survey.
How to assemble modern computer components : Demonstrate how to assemble modern computer components to make a clone PC - Troubleshoot at least 5 Windows/ Unix/ MacOS/ Linux OS errors in a laboratory

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd