Sunday, February 16, 2020

Risk Management Essay Example | Topics and Well Written Essays - 1500 words

Risk Management - Essay Example To do this, the airline embarks on several risk management processes. It is not surprising therefore that for all but the second year of operation Emirates Airlines have recorded profits and growth that always span above 20% (CNN Money, 2005). The airline has recorded a profit every year, except the second, and growth has never fallen below 20% a year. In its first 11 years, it doubled in size every 3.5 years, and has every four years since Current Risk Management Process In the view of Tatum (2011), Risk management is a logical process or approach that seeks to eliminate or at least minimize the level of risk associated with a business operation. Kolakowski (2011) posits that â€Å"risk management is concerned with identifying and measuring the risks faced by the firm.† This makes risk management more of a preventive venture than a curative one. In light of this, the Risk Management Magazine (2011) argues that, most airlines have their risk management undertaken by the intern al audit department. Risk management undertaken by companies varies in scope. Some of the commonest identified scopes of risk management include financial risk and field risk. With particular emphasis on the Emirates Airlines and other aviation services, special emphasis are laid on risk associated with staff and customer safety of customers and staff when talking about risk management. Commenting on a typically workable risk management model for airlines, the Risk Management Magazine (2006) outlines nine areas that airlines could look out for in their risk management exercises. These nines models are â€Å"station size, last audit date, last management change, prior audit report rating, compliance with submitting inventory reports, promptness of remitting funds, promptness of submitting sales reports, magnitude of unreported sales (passengers flown for which the ticket sale was not located), and magnitude of discrepancies with local disbursements† (Goepfert, 2006). Still wri ting on management process for airlines, the International Air Transport Association (2010) outlines areas that airlines may consider in their risk management efforts. According to the association, â€Å"Crew fatigue has typically been controlled by a simple set of prescriptive rules concerning flight time limitations (FTL) and flight duty limitations (FDL).† These model, when carefully followed by airlines guarantees financial returns as well as employee and customer safety. Such safety assured among customer also goes a long way to promote a continued business relations with the airline and invariable ensures profitability for the company. Risk Management Problems Like in every other human endeavor, undertaking a useful measure towards the growth of a company does not come easily. In an attempt to ensuring risk management, there certain challenges that the management of Emirates Airline encounters. First and foremost, there is the problem of defining potential risk. Brodzin ski (2006) notes that the definition to a risk too general. This is to say that in an organization such as an airline where there are certainly many managers in charge of the risk management business of the organization, coming to a consensus about what to include in the risk management plan of the organization always becomes the first and most challenging task. This is because what may seem to be a potential risk to manager ‘A’ may not seem a risk to manager ‘B’. It should however take the identification of a problem before any further action on

Sunday, February 2, 2020

Software Technology Evaluation Research Paper Example | Topics and Well Written Essays - 1250 words

Software Technology Evaluation - Research Paper Example More specifically, organizations are becoming aware of the threats that peer-to-peer software poses to their networks and users who download or upload files. With regard to the request the client made, it is reasonable to have concern over users who install file sharing software without receiving the authority to do so. This is because there are many threats that target files sharing software, which can harm computer users and the corporate resources, as well. While peer-to-peer file sharing software is popular, their mechanisms of operations offer significant opportunities for hackers to perform exploits that can harm its users. More specifically, such software like uTorrent, Bit Torrent and other popular files sharing softwares can allow propagation of malicious codes such as worms, and spyware. File sharing software can also help hackers carry out intrusion into host computers where they can steal data. Unauthorized installation of file sharing software can expose the host compute rs to peer-to-peer worms that can affect the users of the network. Over years, file sharing community has been facing the problem of peer-to-peer worms that exploit the vulnerability of hosts in the peer-to-peer network (Salomon, 2010). ... In most cases, peer-to-peer networks have scanning worms, which can use the peer-to-peer software to exploit network vulnerability. Indiscriminate and unauthorized installation of file sharing software can introduce spyware into the corporate network. It is has been argued that users install spyware software unknowingly because some get installed along free software or files sharing applications (Baskin & Piltzecker, 2006). More often than not, developers of spyware use free software as a way of distributing their spyware programs that hope to exploit unsuspecting users. Because of this approach, unauthorized installation of file sharing software can introduce spyware into the corporate computers such as desktops and laptops (Appleman, 2004). The problem of spyware entails monitoring and sharing of information on the user of the system. This means that a spyware can monitor the use of an infected computer and share the information with the developer of the spyware. Through this appro ach, the organization can lose valuable information that could be used against it by its competitors or hackers for criminal acts. While there other ways that spyware can penetrate the corporate network, unauthorized installation of files sharing network is the most covert way of installing spyware on any computer, whether a desktop or laptop computer. Installation of file sharing software on a corporate network can allow hackers to penetrate the network and execute other functions that harm computers connected to the network. While computers users can install new file sharing software to use for distributing materials on the internet, there are high chances that hackers can use the software to gain access to the network resources such as servers or desktop