Technological Environment
Gregory Hamlin
BUSN 310. Business Theory
Professor Rachel Nagel
American Military University
March 31st, 2012
TECHNOLOGICAL ENVIRONMENT The company I am continuing to work with is US Airways Group. There is plenty of hard and soft technology to list for the domestic environment. Some of the hard technology used in the domestic environment is aircraft, security system, and safety gear. Some soft technology used in the domestic environment is management, government regulations that govern the procedures of the company, and training for employees. The hard technology I listed above is the obvious technology the air line company utilizes yet there is more hard technology being used. The soft
…show more content…
I honest believe this is the only remedy for providing up to date technology, the company has to make it a priority to provide the same technology to the global environment. The customs can be corrected by provided a print out of what is allowed and what is not allowed to be brought into or out of a country a passenger is traveling through. The information is available online but some older passengers aren’t as savvy with technology so they may not receive the same information. With this tactic there is not any excuse for not knowing what is expected when going through customs. The strategies I stated above will be successful, only if they are applied. Without application the strategy will be a failure. Within the domestic environment the security system can be significantly improved and decrease the risk for terrorist attacks greatly. This technology needs to be protected by requiring a security clearance for all employees who work for the company. This way you have a thorough back ground check on everyone who works for US Airways Group and the risk for inside information getting out to enemies of the United States is low. Within the global environment technology needs to be advanced. The company can protect this technology by only providing the technology to its global counterparts and not the
Today, the US combats extremist group ISIS which threatens Iraq, Syria, Libya and internationally. Homeland Security: The US immigration policy changed drastically to achieve the goal of strengthening border security. Visas became harder to obtain for tourists, students and foreign nationals. The new US Immigration and Customs Enforcement agency has overseen a massive increase in deportations, doubled annually since 9-11. The newly created Department of Homeland Security’s defense budget’s sky-rocketed from $16 billion in 2002 to $43 billion in 2011 and border patrol agencies budgets doubled (Green, 2015) Safer Skies: Long airport lines, full body scans, frequent pat-downs are a travel norm, compared to prior 9-11, when one could show up a half-hour before flight, liquid in hand and walk through security without ID. The TSA was created and tasked with enforcing stringent new security procedures at every airport, along with authorized watch lists of flight safety risk individuals (a database of 700,000 names by 2007). These changes made air travel safer with the downside of more travel time, infringement on privacy, increased profiling and scrutiny of
The sales-value at splitoff method captures the benefits-received criterion of cost allocation and is the preferred method. The costs of processing a chicken are allocated to products in proportion to the ability to contribute revenue. Chicken Little’s decision to process chicken is heavily influenced by the revenues from breasts and thighs. The bones provide relatively few benefits to Chicken Little despite their high physical volume.
This case study will discuss the pros and cons of operating an airport with a government-operated system of security versus returning to a privately owned and operated security organization. The Transportation Security Administration (TSA) was introduced to the airline industry after the attacks on September 11th, 2001. Complaints of slow wait times during periods of heavy traffic and the ability to manage the labor force have recently sparked an interest of Airports switching their security to a privatized company.
Many companies have several locations that are statewide as well as international. The threat to the company’s security policy is that much greater because of the company’s expansion; this has placed the company’s information at a higher level for security breaches. The company needs to stay up-to date with the latest technology to make sure the company information can be accessed to all of their locations efficiently. Organizations that have global operations have a harder time effectively securing their information. The Internet is one of the common ways that an international company uses to conduct business; because the company can use their website to post information.
The greatest impacts on aviation security were the events that unfolded on September 11, 2001. “American Airlines Flight 11, a wide –body Boeing 767, crashed into the North Tower of the World Trade Center, at 8:46 a.m. EDT, hitting floors 94 to 98.” (Bragdon, Clifford, 2008, p.127). At 9:02 a.m., United Airlines Flight 175, a Boeing 767, struck the World Trade Center South Tower hitting floors 78 to 85. “A third airplane, American Airlines Flight 77, a Boeing 757-200, crashed into the Pentagon in Washington, D.C., at 9:37 a.m.” (Bragdon, Clifford, 2008, p.127). A fourth airplane, United Airlines Flight 93, a Boeing 757, crashed near Shanksville, Pennsylvania; it is believed its target was the White House or Capitol Building. This plot constructed by Osama bin Laden exploited the vulnerability of the airplanes cockpit and control over the airplane. Bin Laden chose the Boeing 767 for its capability of holding 20,000 gallons of jet fuel to use as a weapon on the twin towers. The transportation system always recognized airplanes as a target of terrorist attacks, but never considered airplanes as been utilized as a weapon in an attack. Domestic agencies were searching for threats in the country. “The September 11 attacks fell into a void between the foreign and domestic threats. The foreign intelligence agencies were watching overseas, while the domestic agencies were waiting for evidence of a domestic threat from sleeper cells within the United States. No one was looking for a foreign threat to domestic targets.” (Kramer, R.M., 2005, International Public Management Journal, 8(3). Unnatural threats are generally man made and include explosives, biological weapons, conventional weapons, military weapons, improvised devices, sabotage, and also unconventional threats such as mental instability of pilots and
Another aspect of creating an enabling environment is the indoor environment. Rich indoor environments have a positive impact on the children's learning and development. An enabling indoor environment is a place where children who spend their time their feel comfortable, interests them and is appropriate for the children's age. It is important that practitioners plan the indoor environment carefully so that it is flexible and accommodates the children's interest and their needs. Also practitioners should make sure that the resources that they are providing are interesting, attractive and to a high quality standard. Practitioners should also make sure that all resources such as building blocks, colouring pens and pencils, dressing up clothes,
Since the 9/11 attacks, security has been a major thing that the U.S has tightened up on airports and international regions across the U.S. Because we don’t have the technology to help stop terrorist attacks in airplanes or other regions, security screening
To this day many are still shaken by the impact of the atrocity and crimes committed on September 11, 2001. In order to help enforce aviation laws and regulations and secure passengers, the Government has taken extra measures to ensure increased safety against such acts of terror. Areas of increased concern include ground security, airport and airplane security as well as passenger safety. New methods of prevention have been introduced such as: Advance Passenger Information; Secure Flight programs; Detection at Ports of
Following the terrorist attacks of 9/11, congress passed sweeping changes to the security of aviation and border protection in the United States. Three agencies were significantly impacted by these changes and the aftermath of 9/11: Transportation Security Administration (TSA), U.S. Customs and Border Protection (CBP), and Federal Air Marshal (FAM). However, 14 years later is important to review the changes which were implemented by sweeping popularity following 9/11 and evaluate their effectiveness.
Technology management (TM) for companies is about sustaining and improving a company’s competitiveness in the long-term; being able to think out-side-the-box of what will be the new best thing before its competitor. There are three main aspects that fall underneath the umbrella of TM, leadership, motivation of employees, and last appropriate management technology. A company’s goal of what they have in mind for TM is to create a synergy among all factors (i.e. research, development, planning, engineering, machines, software, productions, and communications) to make them countersink together
The terrorist attacks on September 11, 2001, revealed a deficiency in the procedures of the airline security system. In an effort to address these concerns the “War on
During one of the company’s presentations to the Dellberg city council, commitments were made to sponsor community events, to support local youth leadership development programs, and to invest in infrastructure to aid in the rebuilding of the city of Dellberg utilizing environmentally responsible techniques.
Contending with terrorism is not something that can be done overnight. It must be strategically thought out and well planned in order to implement the correct procedures. As supervisor of TSA the prevention plan I would put in place is first to analyze the level of security amongst the infrastructure (Schmalleger& Pittaro, 2009). Having firewalls in place gives that layer of protection from possible cyber terrorist, but this should not be the only line of defense (Schmalleger& Pittaro, 2009). Becoming familiar with the methods hackers use allows me to know the best computer security system to install as well as keeping my employee’s knowledgeable by offering mandatory classes in how to prevent cyber terrorism (Schmalleger& Pittaro, 2009).
Airport security is necessary for the safety and efficiency of airlines today. Attacks involving airlines have been “among the deadliest in terms of human lives and economic impact,” even though relatively few attacks have occurred using airlines compared to other terrorism methods (Szyliowicz, 2011, p.2). Airport Security has been administered using a government-operated system since the Aviation and Transportation Security Act was enacted in 2001. The Transportation Security Administration (TSA), now an agency of homeland security, replaced private security measures and personnel with at least 60,000 federal employees (Szyliowicz, 2011). However, privatization may be making a come-back. The following analysis will analyze
As organizations reliance on technology continues to grow so has the amount of cyber attacks which occur compromising organizations information systems and networks. These cyber attacks can have drastic effect on organization financially including downtime or even regulatory fines. Due to this the need to be able to properly identify assets, their vulnerabilities and threats, and the risk they pose to the organization has become a must for ensuring the protection of organizations information systems and networks. This have gave way to the creation of threat modeling process to aid organizations beater identify and mitigate the risk to their organizations security.