Information Privacy Value Chain Analysis: Ruskin Global Transport

Verified

Added on  2023/06/13

|11
|3986
|260
Report
AI Summary
This report provides a comprehensive analysis of Ruskin Global Transport's business information system, focusing on information privacy. It identifies and evaluates the characteristics and significance of information privacy globally, exploring organizational opportunities and challenges related to data protection within the company. The report applies the value chain model to analyze how value is created and delivered by information privacy initiatives at Ruskin Global Transport. Key areas covered include data security systems, database management, artificial intelligence usage, employee education, and the identification of technical resources. The report also addresses challenges such as embedding data privacy, proliferating devices, increasing maintenance costs, access control difficulties, data visibility, and establishing a positive data culture. The analysis aims to provide insights into enhancing data protection practices and leveraging information privacy for competitive advantage and improved productivity at Ruskin Global Transport.
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Successful business
using BIS
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Table of Contents
INTRODUCTION...........................................................................................................................1
Task 1...............................................................................................................................................1
Identify and evaluate the characteristics globally of information privacy.............................1
Identify and evaluate the significance globally of information privacy.................................2
Task 2...............................................................................................................................................3
Organisational opportunities posed to Ruskin global transport by information privacy........3
Organisational challenges posed to Ruskin global transport by information privacy............4
Task 3...............................................................................................................................................6
Apply the value chain and/or virtual value chain to analyse how value is created and delivered
in Ruskin global transport by information privacy.................................................................6
CONCLUSION................................................................................................................................7
References........................................................................................................................................9
Document Page
INTRODUCTION
Business information system is defined as the information system which helps in
providing the information to the business which assist in the decision making process in an
effective and efficient manner. It is used using computing and information technology which has
the primary components of hardware and software along with the data and procedures or people.
It further includes the designing and developing along with the documentation of the relevant
information and necessary data to the business. Information privacy can be defined as the
privacy of the personal data either big or small data within organization (Cottrill, 2020). The
following report is generated on the transport sector based on Ruskin global transport
organization. The below discussion is based on the characteristics and significance of
information privacy and various organizational characteristics and challenges posed by
information privacy. Moreover, applying the value chain to analyse creation and delivery of
value by information privacy with proper conclusion.
Task 1
Identify and evaluate the characteristics globally of information privacy
There are various characteristics of information privacy. Secrecy is one of the
characteristic. This is because secrecy is similar term to the privacy. This is related to the privacy
and secrecy of information. Organization has to first identify that what are all the data or
information which must be protected from unauthorised and unauthenticated sources. Then
accordingly, all such data will be differentiated so that the special personal protection could be
given to such information. This information is known as the secretive data which the
organization follows all the general data protection regulations guidelines in order to safeguard
the data in an appropriate manner. That is why maintaining secrecy is one of the feature of
information privacy. Anonymity is an another characteristic (Rasool, Zaidi and Zafar, 2019).
This is because it states that the data or information which is protected by the firm must be
unknown to the general people who don't have access to the information. Employees who are
authorised and authenticated can only be informed about the information and its privacy
otherwise such protection and its access will remain anonymous as per the needs and
requirements of the company. This is a feature of information privacy which is highly relevant in
terms of the big data management. The reason being is that staying anonymous means that if the
1
Document Page
hackers will not be getting nay idea of the privacy then they will not be breaking any passwords
for data breaches. Solitude is also an another characteristic. This is because it states that the
information must be kept alone in a private place irrespective of any relation with other forms of
data kept nearby. The reason being is that if the information is kept alone and separated then it
can be difficult for the hacker to reach out to the information for losses and breaching. This
features further supports in the proper evaluation of the information without any confusion and
complications with the easy solutions and management of data for better decision making
process (Mohsin, Abbas, Zhang and Iqbal, 2019).
Identify and evaluate the significance globally of information privacy
There are various significance of information privacy. Maintaining good reputation of the
business is one of the significance. The reason being is that if data is protected then it will be
having the less chances to get beached or lost which helps in the maintenance of the data and
good reputation in the market place. Protection of the customers privacy is an another
significance. This can be factor of maintaining good reputation of the firm because of the
customers personal data is safeguarded then reputation can be also be maintained in an industry.
This data involves the personal credentials. Big data management is also one of the significance.
The reason being is that now a days it is a big task of managing the large databases and handling
the big data in order to predict future and conduct analysis for the same. That is why privacy of
such information is important for the big data management. Supports the ethics code is also an
another significance (Sandu and Gide, 2019). This is because information privacy is related with
the following of the several instructions and guidelines of the various data protection act. This
way company can follow such ethics of data. Provide competitive advantage is one of the
significance. Data protection brings competitive edge to the firm because if the data is protected
then it can be analysed according to the market conditions which finally supports in gaining the
competitive advantage to the firm. Enhances level of productivity is an another significance. The
reason being is that data is protected majorly which is important to the firm which gives good
level of productivity. Such information is required to be safeguarded for further analysis and
improvements in the performance that ultimately provides the brand value of the firm.
Encourages adoption of advanced technology is also one of the significance. If the strategies of
data protection is successful by the organization then it motivates the firm to implement other
essential updated technology which further improves the functioning of the company. Supports
2
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
in better data analysis and in decision making process is also an another significance. Protected
data is highly used to identify the performance gaps and decision making for the enhancements
and that it is information privacy is significant for the company (Taeihagh and Lim, 2019).
Task 2
Organisational opportunities posed to Ruskin global transport by information privacy
There are various organizational opportunities posed to the company by information
privacy. Such as organization can have the personal security systems for big data management is
one of the organisational opportunity posed by information privacy. Information privacy highly
requires the personal security system within an organization which ultimately provides the
opportunity to the organization to install the security systems for big data management in order
to have tight security for private and important data. Therefore it has an opportunity for
managing the big data while installing the personal security systems in the company. Database
management system can be installed with updated and advanced features is an another
organisational opportunity posed by information privacy. Information privacy provides the
opportunity to manage the database systems with advanced features and updated installation.
This helps the organization in using the advanced technology in terms of database Management
which further helps in analyzing the data for future considerations and decision making process.
Usage of artificial intelligence can be made in storing and processing of data is also one of the
organisational opportunities posed by information privacy (Barati, 2022). Information privacy
also provides the opportunity in using the emerging technology of artificial intelligence which
further helps in storage and processing of the data. This supports in the modifications of data
such as per the needs and requirements of the customer's. It facilitates in analyzing the customer
demands and produces the product accordingly as per the data gathered with the help of artificial
intelligence. Advanced tools used for information privacy for better data alteration is also an
another organisational opportunity posed by information privacy. Information privacy provides
the adoption of advanced tools and techniques for better alterations so that the processing of the
data can be done in a strategic management. This is because it helps in the strong privacy of
private and important information. This processing helps the organization in fetching out the
relevant data and eliminating the useless information. Less requirements of information security
if systems are installed for the same purposes that is automation is one of the organisational
3
Document Page
opportunity posed by information privacy (Young, Rodriguez, Keller and Howe, 2019).
Information privacy provides the opportunity for automation in which the entire stages of data
gathering to the data processing and using is done in an automatic manner. This helps your
organization in cutting the cost of human resources and the cost efficient installation of security
systems which are installed for similar purposes with the help of automation opportunities
provided by information privacy. Educating employees regarding information privacy helps in
employee growth which reduces employee turnover is an another organisational opportunity
posed by information privacy. Information privacy highly requires the expertise in technology
which can handle the security systems and the best practices which can be performed by the
employees in order to avoid any cyber crime. This involves the training and development to the
Employees about the information regarding how to maintain privacy of the information. This
motivates the employees in increasing their knowledge and productivity levels as well.
Information security can be identified and level of protection is also one of the organisational
opportunities posed by information privacy. Information privacy helps in the identification of the
gaps in the information security currently available in the organization. This helps to identify the
level of protection the security systems are given to the Private data and how it can be improved
for tight security. These gaps are filled by the information privacy tools and techniques adopted
by the organization. Identification of the technical resources to be updated and required for the
further privacy is also an another organisational opportunity posed by information privacy.
Information privacy provides the opportunity to identify the types of technical resources which
are required in the organization for further updates and the level of privacy required for the
existing technical resources in the company. This opportunity helps the organization in effective
and efficient use of technical resources (D'Adamo, Falcone and Ferella, 2019).
Organisational challenges posed to Ruskin global transport by information privacy
There are various organisational challenges posed to company by information privacy.
Such as embedding data privacy is one of the organisational challenge posed by information
privacy. This is because many organizations just protect their private information instead of
focusing on the in depth installation of the security system. This creates risk to the data
protection due to lack of updated and advanced security system with proper training and data
strategy adoption in the firm. Proliferating devices is an another organisational challenge posed
by information privacy. There are various advanced devices such as internet of things and block
4
Document Page
chain technology which are directly linked with the data privacy (Zannat and Choudhury, 2019).
Maintenance is difficult if such heavy emerging technology is related with the information
privacy as it creates complications. Increasing maintenance cost is also one of the organisational
challenge posed by information privacy. Data increases day by day which also increases the cost
of maintenance of data. It also includes the cost of maintaining privacy and cost of human
resources as well who are responsible in monitoring the data privacy. Difficulty in access control
is also an another organisational challenge posed by information privacy. Organization protects
data with one of the most effective tool and technique that is the access control. But it is difficult
to manage until and unless it is being controlled by the technical expertise and that is why it is
regarded as one of the challenge. Getting visibility into all the data is one of the organisational
challenge posed by information privacy. Big data is protected which grows exponentially on vast
basis at every next day, this creates problems in getting the visibility of data that where the data
has to be used and how it can be processed. A bad data culture is an another organisational
challenge posed by information privacy. Many organizations has the weak data protection
methodology which is considered as the bad data culture. Such negative culture initiates with the
challenge in the information privacy which can also lead to the data breaches and losses (Matyas
and Kamargianni, 2019). The ever increasing scale of data is also one of the organisational
challenge posed by information privacy. Either it is a big organization or a small company. Data
always grows every day either of the customers or of the suppliers and can be of the competitors.
This growing data creates complications in management which ultimately can result in the
hindrances in information privacy. A long list of regulations and documentations to follow is
also an another organisational challenge posed by information privacy. There are several acts and
laws which are associated with the information privacy and are necessary to follow them. It
consumes time and energy and therefore, it is considered as the challenge in information privacy.
Such documentations are heavy in general and needs to maintain for proper detailing. Human
error creates the lots of complexity is one of the organisational challenge posed by information
privacy. Lack of technical expertise and professional creates huge complications and results in
the human error that ultimately leads to challenges in the information privacy. The number of
open vulnerabilities is an another organisational challenge posed by information privacy. There
are several types of vulnerabilities which are related with the challenges in information privacy
such as hackers can break the weak passwords, if employees are not trained regarding the
5
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
privacy then it can lead to the victim of cybercrime, if systems are not updated on the frequent
basis then it can result in the data losses without any recovery and similarly the problems in
authentication and authorization along with the encryption and decryption which is followed by
the access control can create the challenges in information privacy (Koh, Dolgui and Sarkis,
2020).
Task 3
Apply the value chain and/or virtual value chain to analyse how value is created and delivered in
Ruskin global transport by information privacy
A value chain can be defined as the different activities and processes of the business
which are involved in creating the new product or service. It mainly consists of different stages
and life cycles which includes the research and development and many more in between. In the
current report value chain analysis is being done of the information privacy used in the transport
sector. Value chain analysis has different types of activities which are classified into the primary
and secondary activities. For example primary activities include the operations and inbound and
outbound privacy of information. Secondary activities involve the procurement and
technological development along with infrastructure and human resource management
(Arislanovna and Bakhtiyorvich, 2021). Value chain analysis is basically the analysing each and
every activity in the value chain of the company in order to understand the opportunities for
improvement. It basically focuses on the cost reduction and differentiation methodology in terms
of information privacy in order to gain the competitive advantage from the competitors in the
marketplace. Value chain analysis for information privacy in order to deliver value to the
organisation consists mainly of three stages which are implemented by the transport sector.
Identification of the value chain activities is the first stage which helps in the understanding of all
the primary and secondary activities which are involved in the privacy of information. If the
company has different security systems then it is important to perform the value chain analysis
for each of the security systems so that the identification of the best one and alternative one can
be examined in a better way (Brand, Anable and Morton, 2019). This will facilitate in
determining the effectiveness and efficiency of the security systems adopted by the organisation
for the information privacy so that it can deliver the value to the business. Determining the cost
and value of the activities is the second stage in which the entire process and the cost involved
6
Document Page
are determined in an in-depth manner. This process investigates the value created by the
activities and how it can satisfy the end user services. In the context of information privacy then
the organisation can install the security system which is most relevant for the current data stored
in the organisation (Milne and Watling, 2019). It is important to analyse the entire cost of storing
the data and its privacy security system so that it cannot go out of the budget and remains
efficient in the entire process of the value chain analysis. Therefore it is essential to understand
the cost which is related to each and every step of the process and depends upon the situation so
that the lowering of the expenses in order to improve the value of each security system can be
made by the organisation. Identifying the opportunities for competitive advantage in order to
create and deliver the value to the organisation in terms of information privacy is the third stage
of value chain analysis. This step is conducted when the compilation of value chain and cost
associated with every step is analysed so that the competitive advantage which are trying to
achieve by the company can be e assessed. If the fundamental objective of the organisation is to
reduce the cost then it is important to evaluate every piece of the value chain by reducing the
expenses. And if the fundamental objective of the organisation is to differentiate the security
system used by the organisation from the competitors, it must focus on the best alternative
opportunity in order to justify the investment of the additional resources. Conducting value chain
analysis for the information privacy helps in good return on investment on the security systems
then by the organisation in order to safeguard the personal and important data for better and
effective database management systems within an organisation. Value chain analysis is highly
effective which understands and contextualises the business process and collaborates with other
frameworks that the conception of evaluation of the organisational performance can be in the
form of winning strategies and more efficient conducting of the activities (Yannis, Kopsacheili,
Dragomanovits and Petraki, 2020).
CONCLUSION
It is concluded that business information systems and information privacy is an important
concept to learn and study so that its applications can be applied in the actual world
organizations. This is because now a days it is impossible for the organizations to operate
without adopting the technology and making use of information systems. Therefore, privacy is
important in order to avoid the data breaches or losses. This is done to steal money or for the any
personal revenge by the hackers which can result in the huge loss or even shutting down of the
7
Document Page
business. Hence, it is important to analyse the characteristics and significance of information
privacy. It is essential to examine the various organizational characteristics and challenges posed
by information privacy. It is necessary to determine the value chain to analyse creation and
delivery of value by information privacy. Hence, the above report covers all such areas in order
to better understand the conception of business information system and information privacy.
8
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
References
Books and Journals
Arislanovna, Y. and Bakhtiyorvich, G.B., 2021. Marketing And Information Support In Public
Sector. European Journal of Molecular & Clinical Medicine, 8(1), pp.940-947.
Barati, M., 2022. Open Government Data Programs and Information Privacy Concerns: A
Literature Review. Available at SSRN 4029092.
Brand, C., Anable, J. and Morton, C., 2019. Lifestyle, efficiency and limits: modelling transport
energy and emissions using a socio-technical approach. Energy Efficiency, 12(1), pp.187-
207.
Cottrill, C.D., 2020. MaaS surveillance: Privacy considerations in mobility as a
service. Transportation Research Part A: Policy and Practice, 131, pp.50-57.
D'Adamo, I., Falcone, P.M. and Ferella, F., 2019. A socio-economic analysis of biomethane in
the transport sector: The case of Italy. Waste Management, 95, pp.102-115.
Koh, L., Dolgui, A. and Sarkis, J., 2020. Blockchain in transport and logistics–paradigms and
transitions. International Journal of Production Research, 58(7), pp.2054-2062.
Matyas, M. and Kamargianni, M., 2019. The potential of mobility as a service bundles as a
mobility management tool. Transportation, 46(5), pp.1951-1968.
Milne, D. and Watling, D., 2019. Big data and understanding change in the context of planning
transport systems. Journal of Transport Geography, 76, pp.235-244.
Mohsin, M., Abbas, Q., Zhang, J. and Iqbal, N., 2019. Integrated effect of energy consumption,
economic development, and population growth on CO2 based environmental degradation:
a case of transport sector. Environmental Science and Pollution Research, 26(32),
pp.32824-32835.
Rasool, Y., Zaidi, S.A.H. and Zafar, M.W., 2019. Determinants of carbon emissions in
Pakistan’s transport sector. Environmental Science and Pollution Research, 26(22),
pp.22907-22921.
Sandu, N. and Gide, E., 2019, September. Adoption of AI-Chatbots to enhance student learning
experience in higher education in India. In 2019 18th International Conference on
Information Technology Based Higher Education and Training (ITHET) (pp. 1-5). IEEE.
Taeihagh, A. and Lim, H.S.M., 2019. Governing autonomous vehicles: emerging responses for
safety, liability, privacy, cybersecurity, and industry risks. Transport reviews, 39(1),
pp.103-128.
Yannis, G., Kopsacheili, A., Dragomanovits, A. and Petraki, V., 2020. State-of-the-art review on
multi-criteria decision-making in the transport sector. Journal of traffic and transportation
engineering (English edition), 7(4), pp.413-431.
Young, M., Rodriguez, L., Keller, E. and Howe, B., 2019, January. Beyond open vs. closed:
Balancing individual privacy and public accountability in data sharing. In Proceedings of
the Conference on Fairness, Accountability, and Transparency (pp. 191-200).
Zannat, K.E. and Choudhury, C.F., 2019. Emerging big data sources for public transport
planning: A systematic review on current state of art and future research
directions. Journal of the Indian Institute of Science, 99(4), pp.601-619.
9
chevron_up_icon
1 out of 11
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]