J/617/2270 Managing Business Information Assignment

Assignment Help Management Information Sys
Reference no: EM132736046

J/617/2270 Managing Business Information - OTHM Level 4 Diploma In Business Management

Learning Outcome 1: Understand how to assess information and knowledge needs of an organisation.
1.1 Summarise the typical business decisions made by organisations.
1.2 Evaluate the information and knowledge needed to ensure effective decision making.
1.3 Assess internal and external sources of information
required.

Learning Outcome 2. Understand communication processes in an organisation.
2.1 Report on existing processes of communication in an organisation.
2.2 Determine benefits and limitations of existing communication processes.
2.3 Justify areas of improvement for communication processes.

Learning Outcome 3. Be able to improve systems relating to information and knowledge.
3.1 Report on existing approaches to the collection, formatting, storage and dissemination of information and knowledge in an organisation.
3.2 Recommend a strategy to improve the collection, formatting, storage and dissemination of information and knowledge.
3.3 Implement an improvement to access of information and knowledge in an organisation.

Scenario

On September 6th, Thursday, AXION Airways announced it had suffered a breach resulting in the theft of customer data. In interviews with the TV24, the company noted that around 380,000 customers could have been affected and that the stolen information included personal and payment information but not passport information. The organisation also stated very clearly that information was stolen from the AXION Airways website and mobile app. Shares of AXION Airways' parent company AAG fell around 4% as markets opened on Friday morning, hours after the airline said that their customer information "compromised" in a data theft. The company's chairman and chief executive, Alex Cruz, said: "We are deeply sorry for the disruption that this criminal activity has caused." Speaking to TV24News, he said the online vulnerability had now been fixed after it was discovered on Wednesday and indicated compensation could be a possibility for anyone who had lost money.

Despite AXION's quick reporting of the breach, experts think the airline could be hit by a huge fine under the GDPR, which came into place on May 25. Previously, the largest fine issued by the Information Commissioner's Office (ICO) was £500,000. If the airline's parent group AAG is held accountable instead, the number could be even higher.

As a measurement to improve their services AXION Airways has decided to train all their employees on managing business information. You work as an IT operations manager and you are asked to conduct several training sessions to upskill all the employees with the current best practices.

Task 1

You have decided to start the training with a presentation.

Instructions

a. You start your presentation by summarising the typical business decisions made by AXION Airways.
b. Provide an assessment of the internal and external sources of information required.
c. You conclude the presentation by providing an evaluation of the information and knowledge needed to ensure effective decision making.

Task 2

Your following task is to create an overarching report considering the data breach. You have planned to do the following:

Instructions

Your report will consist of two parts.

a. In the first part, make the readers aware of the communication processes used in AXION Airways by reporting on existing processes of communication in British Airways.
b. Determine the benefits and limitations of existing communication processes.
c. Using the case scenario of confidential data breach, justify areas of improvement for communication processes.
(ACs 2.1, 2.2, 2.3)

d. In the second part, report on existing approaches to the collection, formatting, storage and dissemination of information and knowledge in AXION Airways.
e. Recommend a strategy to improve the collection, formatting, storage and dissemination of information and knowledge in AXION Airways.
f. Provide a commentary on how you would have implemented an improvement to access of information and knowledge in an organisation.

Attachment:- Managing Business Information.rar

Reference no: EM132736046

Questions Cloud

Designing and managing integrated marketing communications : Designing and Managing Integrated Marketing Communications. How consistent are the different communications? Provide specific examples.
Determine the average number of customers waiting in line : A vending machine dispenses hot chocolate or coffee. Service time is 25 seconds per cup and is constant. Customers arrive at a mean rate of 57 per hour
Cloud-based reputation checks is performance : One of the big challenges with cloud-based reputation checks is performance.
What is supply chain inventory control : What is Supply Chain Inventory Control, choose a type of business you preferred to have in the future and then select two Inventory Techniques
J/617/2270 Managing Business Information Assignment : J/617/2270 Managing Business Information Assignment Help and Solution, OTHM Level 4 Diploma In Business Management - Assessment Writing Service
How you would improve the health of populations : The Triple Aim Initiative approach emphasizes the need for healthcare organizations to optimize their performance. It also addresses the following three aims.
How to managing inventory efficiently : You are the owner of a grocery store. You are hiring a new store manager. What all will you tell him about managing inventory efficiently?
Create strategic communication plan : Before you create a strategic communication plan, you need to understand the target audience.
Construct a pareto chart either in excel : Construct a Pareto chart either in excel or on paper to identify the significant problems.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Discuss what you have learned about privacy

Discuss what you have learned about privacy, or the lack thereof, in today's technology. Is privacy at a comfortable level in general for you?

  Social impacts of technology historic and current impact of

social impacts of technology historic and current impact of computerscomputerswrite about their historic and current

  Entities and attributes would be tracked at starbucks

Write a 3 Page Paper about which entities and attributes would be tracked at Starbucks and why these are important. Gather as much info as possible without being too wordy

  How does the film create a sense of space

How does the film create a sense of space, or what kid of space is used in the film. Does it feel tight or cramped, open?

  Create a cost analysis and develop proposal for the company

Section 1: Network Consultation Proposal - Create a cost analysis, and develop a proposal for the company

  What does website offer information security professional

What is this Web site, and what does it offer the information security professional? Visit the "Know your Enemy" white paper series and select a paper of your.

  Determine and sketch spectrum of resulting pam signal

Figure shows the idealized spectrum of a message signal m(t).- Determine and sketch the spectrum of the resulting PAM signal.

  How disaster recovery planning ensure business continuity

How does disaster recovery planning ensure business continuity? Disasters like the 9-11 attacks are extreme and fairly unlikely to happen in your environment, but these disasters sometimes do happen and there is no substitute for preparation

  Discuss how to access team productivity

Discuss how to access team productivity? What conditions need to be in place for teams to excel and why?

  Phases of system designwhat is the primary target of

phases of system designwhat is the primary target of systems design and what phases are included in the systems

  Justify the need of the ieee 802 standard used in networking

Evaluate the three (3) standard organizations including IEEE, ISO, and ANSI to determine the most important for communication technology. Take a position on the need for a federal regulating body of standards such as NIST. Include supporting..

  Describe a type of email threat and how a hacker can use

In no less than 250 words, describe a type of email threat and how a hacker can use it to get sensitive information.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd