Reference no: EM131253858
HanaTour: Gaining Customer Trust Through Increased Security
HanaTour International Service is South Korea's largest provider of overseas travel services and air tickets. HanaTour employs nearly 2,500 people in Korea and travel agents outside Korea to provide clients with travel information for about 26 regions worldwide.
HanaTour customers who book travel provide the company with personal details, including their addresses, contact phone numbers, dates of birth, passport numbers, and payment information. These details, along with their airline and tour bookings and travel itineraries, are stored in HanaTour's database. The confidential nature of this information means HanaTour must have security measures in place to protect the database from unauthorized access.
In addition to these marketplace requirements, HanaTour must comply with South Korea's Electronic Communication Privacy Act. That act requires industries to take measures to protect the privacy of personal information. Thus, protecting customer data is not only good business, but also a legal requirement.
To improve database security, HanaTour added data encryption, both in the database and during transmission. The company also implemented access control based on individual authorizations and assigned tasks. To discourage hacker attacks, HanaTour blocked database access even if a hacker obtained top-level administrator privileges for the system. They created an audit trail of database access to spot suspicious activities so that action could be taken immediately. They also published reports to show compliance with security requirements and used audit information to develop further security plans.
Like most small and medium-sized firms, HanaTour does not need the skills that this security upgrade called for on a permanent full-time basis. Rather than hiring and training staff members to address short-term needs and then releasing or finding other work for these employees, HanaTour engaged specialists. The company worked with Korean database consulting firm Wizbase. HanaTour had worked with Wizbase previously, so they didn't have to spend time explaining basic information about how HanaTour's business works.
The net result of these actions was to make it much more difficult for unauthorized people to see any of the personal information that HanaTour customers supplied. Did this help HanaTour? According to Kim Jin-hwan, director of the HanaTour's IT department, "Our business is based on service. We do not want anything to go wrong on a customer's holiday that will inconvenience them. Lost data or any disruptions to our system would affect our ability to provide optimum service. We upgraded our database to improve performance and take advantage of new security features, which would minimize the risk of losing confidential customer data and strengthen our database and systems from unlawful access."
Discussion Questions
1. From the user side, Mr. Kim said that HanaTour upgraded to a new release of its database management software due to its improved security features. What are the business advantages of improved security?
2. How does HanaTour use the data it collects from the audit to increase the security of its data?
Critical Thinking Questions
1. HanaTour chose Wizbase as its implementation partner in part because of prior experience with that firm. Many small-to-medium companies need to outsource security tasks because they lack the expertise. Does this present an added security risk? Why or why not?
2. Think of the data that your university's database has about students as a large table, with a row for each student and a column for each data element. Group the data into major categories such as contact data, medical data, financial data, academic data and so on. Which groups of people, by job, should have access to each category? Within a group, who should have access to only one row, who should have access to more than one row but not all rows, and who should have access to all rows of the table? Should anyone be allowed to see data but not change it?
Percentage of receivables method
: Officials havelooked at all available evidence and come to the conclusion that 15 percent of ending accounts receivable($160,000 ×15 percent or $24,000) is most likely to prove to be uncollectible. How does application ofthe percentage of receivab..
|
Describe the traits and characteristics of diversity
: Describe the traits and characteristics of diversity within this organization. What leadership techniques would you, as the administrator, engage to promote a more diverse organization
|
Value of the price elasticity of demand for cigarettes
: In the mid 1900s, the government in the uk announced that for every 10 per cent rise in the price of cigarettes, the demand is likely to fall by 6 per cent. If this information is correct what is the value of the price elasticity of demand for cig..
|
Describe a public organization
: Describe a public organization and a change that the organization is experiencing or has experienced. Analyze the source of the change and its implications for the organization
|
What are the business advantages of improved security
: What are the business advantages of improved security? - How does HanaTour use the data it collects from the audit to increase the security of its data?
|
What might cause both airlines to price low
: Provide an intuitive explanation on which equilibrium you might expect to see? What might cause both airlines to price low?
|
Modern definition of economics
: In Mark Skousen's article, "What is Economics, Anyway?," he bemoans the apparent fact that the modern definition of economics is incomplete. What does he say is missing?
|
What are the new cournot equilibrium quantities and price
: A homogeneous products oligopoly consists of four firms, each of which has a constant marginal cost MC = 5. The market demand curve is given by P = 15 - Q.
|
Examine the role of enterprise resource planning
: Examine the role of Enterprise Resource Planning (ERP) and Customer Relationship Management (CRM). Determine how each system can play a critical role in managing value chains
|