Nowadays, there is a rapid development in the information and technological system, which has increased the national and international movement of people from one place to another. Due to globalization, there is an implementation of innovative and creative ideas in the managerial framework to attain maximum profit in the dynamic environment (Abdul, et al., 2014).
At the same time, there is an increment in the use of social sites by the people to aware themselves about the current business practices. Many companies are using social sites for connecting and building the effective relationship with the customers.
But, at the same time, it has been noticed that the tremendous use of social sites has emerged various threat for the customers in concerned with privacy issues and breach of data. The cyber crime has increased the number of hackers, which leaks the confidential and private information of the people in respect with the personal and professional (Nicchiotti, 2014).
In this report, a managerial framework of QANTAS has been demonstrated for developing in-depth information about the ethical issues encountered by the company for satisfying the needs of the customers.
In the current business environment, companies make effective strategies for implementing the Informational and Technological parameter, within the management. It helps in gaining competitive advantage as well as to maximize the productivity of the company.
QANTAS outlines various techniques in its managerial framework for satisfying the needs and desires of the customers. (QANTAS, 2016) But, at the same time, the development of the technology has increased the illegal activities such as crime, fraud and identity theft for the customers for maximizing the profit margin in a limited time span.
The development of informational and technological parameters with the help of social sites has also increased multiple illegal activities such as terrorist, which has majorly impacted the goodwill of QUANTAS in the competitive market. In addition, the report highlights the computer security and data breach that has occurred recently and affected the performance of the company.
QANTAS airline company has implemented IT system to enhance and shorter the traveling process for the customers. IT process has helped in providing superior quality services such as Robotics and Artificial Intelligence services to the customers for making them loyal towards the brand for a longer period.
The Information and Technology system play an important role in providing convenience services to the customers as well as helps the companies to sustain in the competitive market. QANTAS by implementing modern technology and software such as online services for booking electronic tickets helps in attracting more passengers towards the management (Saito, et al., 2014).
At the same time, QANTAS by using IT services has implemented biometric or self service check in system at the airports for achieving quick goals. This system has helped QANTAS to supervise and monitor the performance of employees and staff members in order to maximize the profitability.
The biometric devices at the airports are properly managed so that there are no issues in concerned with the idle bags drops.
At the same time, IT has played a significant role for QANTAS to operate its business at the rapid rate because the process helps in accomplishing the targets on time with optimum utilization of available resources. Various benefits such as tangible and intangible benefits are attained by the company with the help of IT system (Subashini and Kavitha, 2011).
It is because QANTAS is able to reduce its additional cost, which has been implemented in the production cycle for creating valuable contribution for the customers. The technological enhancement has also helped the company to build the effective relationship with the customers with the help of modernized tools and techniques.
The effective communication system through websites and other medium is beneficial for the airline’s companies to coordinates different activities and spread awareness among the customers. It is necessary for airlines industry to develop its technology in order to make the journey safer and memorable for the passengers.
In addition, Information and Technology also create the negative impact of the company in the minds of the customers. It is because IT system arises many security issues for the employees and customers.
Nowadays, the implementation of modern technology by QANTAS has created security issue as there is breach of financial data, private and confidential information of the customers (QANTAS, 2017). The problems faced by QANTAS were connected with the breach of data and secret information of the customers in respect with the manipulation of the data.
The loss of private information from the managerial framework of the company by the hackers has negatively impacted the performance. It has declined the rate of customers for accomplishing their journey with QANTAS and has started blaming the management.
The foremost objective of the hackers was to collect in depth information about the personal bank account, login ids, password etc. for maximizing the personal interest. The names and email ids of the customers are also theft, which has ruined the legal parameter of the company for continuing the business operations (Xiang, et al., 2015).
Similarly, unauthorized activities in respect with computer security are accomplished by doing money laundering, theft, and manipulation of personal data.
At the same time, the fraudulent activities are done by arranging the fake accounts of the customers. The implementation of traditional methods and practices has also affected the goodwill of the company due to lack of privacy and secrecy of personal information.
The traditional methods broke the effective relationship and coordination with the customers due to lack of security principals (QANTAS, 2017). In addition, managing the activities by following multiple devices and system affects the security concern and affects the management.
There are various issues, which has been aroused due to the implementation of that informational and technological system in the management. In QANTAS, with the development of technology in the managerial framework, there is an increment in the cyber crime and social crime by the hackers for maximizing their revenues (McGuire and Dowling, 2013).
It is because technological up-gradation also affects the privacy and confidential information of the travelers. The implementation of CCTV cameras at the airports affects the privacy of the employees as well as of the customers. It is because the cameras are placed at the airports for detecting the single movements as well as personal transactions, which hinders the security level of the people (Sun, et al., 2015).
On the other hand, issues in the system have been noticed due to an absence of upgraded team security system for maintaining dual password in the managerial activities. The private information of the customers has been theft to manage the individual business for maximizing the profit margin (Mules, 2013).
The security issue has also been raised due to lack of proper standards to evaluate the efficiency of the employees by following internal review process.
In addition, managers of Qantas airlines by implementing technologies such as real time warehouse in order to store the data have also affected the client information system, flights information and seat inventory for managing finances, security issues and other related issues.
It is necessary for the companies to overcome the issues from its managerial framework for making the business activities successful in the market. The removal of transactions related to cyber crime can be achieved by improving the technical and the mechanical system of the company.
In addition, security issues can be abolished from the system by implementing hacking tools and techniques. It will help the company to satisfy the needs of the customers by holding their interest level (Farsole, et al., 2010).
The execution of security protocols and system in the QANTAS and other specific services will be beneficial in protecting and guarding the stored personal and professional data of the customers. Moreover, executing the principles by following the standardized methods can be helpful for securing the data so that it is not manipulated for doing the crime.
At the same time, the company by educating the customers to change the password during the hacking activity can save from hazardous activities of cyber crime and breach of data.
The accomplishment of the different department is also helpful in retaining the information of customers and employees. The mitigating of security issues from the managerial framework can also be done upgrading the improving the existing system for developing effective customers base.
It is because the process helps in expanding the business as well as to gain the competitive edge over the competitors (Cui and Li, 2015). The upgrading system helps in removing the virus and junk data from the system for maintaining the secrecy in the personal and private information of the customers.
On the other hand, the reviewing process in the information and technological activity facilitates in increasing the efficiency of QANTAS to fulfill the needs of customers in the highly competitive business environment. The error and frauds from the managerial activities can be easily identified by supervising the process of a capital intensive method.
At the same time, privacy issue can be overcome from the management by eliminating and restricting the flow of secret information and data of the customers among the employees. The decline in the accessibility rate of customer’s information by the employee’s assists in reducing the changes of errors and frauds.
It is recommended to QANTAS, that the company can make significant use of product differentiation strategy for optimizing the use of an informational and technological system.
The company to attract more customers should make an effective recruiting process for providing customized and personalized services. In addition, issues related security can be minimized by QANTAS in its managerial framework by installing the security fix system and network at the airports (Khan, 2010).
It is because the system assists in protecting the internal information of the customers to pass to the external parties. At the same time, investment in the advanced and updated technological system will support in protecting and guarding the interest of the travelers as well as the employees.
The implementation of double authentication software will also be beneficial for the company to eliminate the risks from breach of data because the system facilitates in acquiring the information by entering two time password for login.
On the other hand, the computer security and errors can be minimized by establishment business controlling group in the management. It is because the personal information can be protected from the hackers by building the effective network in the company.
Time to time reviewing and monitoring the performance of the company also assist in controlling cyber crime (Schwalbe, 2015). The frequent meetings and conferences organized by the management also help in supervising the activities of the organization.
In like manner, QANTAS by implementing the antivirus software in the management will be able to preserve the secrecy in the information such as financial and personal data of employees and customers.
The enhancement of employee’s knowledge and skills in regards to the cyber crime will assist the company to deal with the human resources in an effective manner without disturbing the personal information of the people.
From the above discussion, it can be summarized that social media play a significant role in attracting and spreading awareness among the customers about the current offering of the companies.
Social media helps the customers and employees to avail quick information about the current business environment. Information and technological system helps in creating better communication with the people.
But, at the same time, implementation of information and technological development creates critical problems for the company in the form of cyber crime and theft of personal information. It also results in dissatisfaction among the customers because of breach of data and computer security.
In addition, QANTAS for overcoming the long term security issue must consider the legal framework in association with a social network and websites. Moreover, the implementation of hacking devices and techniques in the department will help in protecting and safeguarding the interest of connected stakeholders.
Abdul, M., Aziz, M. K. A. and Yahya, M. (2014) Customers Satisfaction Towards the Services Provided in Kuala Lumpur International Airport, Malaysia. China-USA Business Review, 45.
Cui, Q. and Li, Y. (2015) Evaluating energy efficiency for airlines: An application of VFB-DEA. Journal of Air Transport Management, 44, pp. 34-41.
Farsole, A. A., Kashikar, A. G. and Zunzunwala, A. (2010) Ethical hacking. International Journal of Computer Applications (IJCA), 1(10),pp. 14-20.
Khan, M. E. (2010) Different forms of software testing techniques for finding errors. International Journal of Computer Science Issues, 7(3), pp. 11-16.
McGuire, M., & Dowling, S. (2013) Cyber crime: A review of the evidence. Summary of key findings and implications. Home Office Research report, 75.
Mules, R. (2013) The long haul: The QANTAS-Emirates Alliance. Busidate, 21(3), pp. 2.
Nicchiotti, G. (2014) Health monitoring requirements elicitation via House of Quality. In Aerospace Conference, 2014 IEEE (pp. 1-15). IEEE.
QANTAS (2016) Annual Report [Online] Available at: https://www.qantas.com.au/infodetail/about/corporateGovernance/2016AnnualReport.pdf (Accessed: 27 May 2017)
QANTAS (2017) [Online] Available at: https://www.qantas.com/au/en.html (Accessed: 27 May 2017)
QANTAS (2017) [Online] Available at: https://www.crikey.com.au/2017/04/04/qantas-passenger-views-other-passenger-details-in-data-breach/ (Accessed: 27 May 2017)
Saito, N., Yari, T. and Enomoto, K. (2014) Flight demonstration testing with distributed optical fiber sensor. In EWSHM-7th European Workshop on Structural Health Monitoring.
Schwalbe, K. (2015) Information technology project management. USA: Cengage Learning.
Subashini, S., & Kavitha, V. (2011) A survey on security issues in service delivery models of cloud computing. Journal of network and computer applications, 34(1), pp. 1-11.
Sun, J. R., Shih, M. L., & Hwang, M. S. (2015) A Survey of Digital Evidences Forensic and Cybercrime Investigation Procedure. IJ Network Security, 17(5), pp. 497-509.
Xiang, Z., Magnini, V. P. and Fesenmaier, D. R. (2015) Information technology and consumer behavior in travel and tourism: Insights from travel planning using the internet. Journal of Retailing and Consumer Services, 22, pp. 244-249