As a result the revenue generated from the business is mainly in the form of commission for them. In case of the web sites operated by United Airlines themselves, the services are owned by them and therefore, the revenue is direct. (Abdollahi & Leimstoll, 2011)
Another model used is the advertising business model. According to this model, the UAL provides advertisement to the companies. These companies then broadcast the advertisements on their website. According to this model, the revenue is commission based and the commission is based on the contract. (Abdollahi & Leimstoll, 2011)
The aforementioned business models can be used together. The advertisement model would work as an attracting force that increases the flow of the customers whereas the brokerage model will be applied to the websites that are either company owned or third party operated. (Abdollahi & Leimstoll, 2011)
System Development Life Cycle
System development life cycle (SDLC) is the name given to the process by which the companies introduce, maintain and dispose new and old information systems. SDLC uses the method of strict review at the end of every phase. In this way, the UAL will be able to have more control on management. (Radack, 2002)
In addition to that, companies working according to the SDLC process rely on regular documentation about every phase and the problems associated with it. Therefore, the benefits and demerits of an information system is obtained and the implementation is made easy. (Radack, 2002)
UAL can also benefit from System Development Life Cycle by having an archive of all documents. All the events and transactions during the design or implementation of an information system can be traced back to their origin and discrepancies can be reduced to a minimum. (Radack, 2002)
The use of SDLC leads to the invention of products which can be introduced in the market as well. In case of UAL, new ideas or strategies can be found during the process which can then help UAL in other matters. (Radack, 2002)
Business Continuity Planning
The first phase of business continuity is the evaluation phase. This phase involves the identification of risks, threats and strengths. United Airlines has also identified the risks associated with the airlines business. These risks are mainly related to security, fuel efficiency and loyalty. (Hermann, 2008) (Gavito, 2013)
The second phase is the implementation. In this phase, the company makes a strategy and implements it. United Airlines has also implemented its strategy by making its fleet the most fuel efficient fleet in the world. United Airlines has also targeted customer loyalty by introducing extensive routes so that the customers choose united only. In addition, security measures are also enforced to take care of the final risk. (Hermann, 2008) (Gavito, 2013)
The last to come is the steering phase. In this phase, the results of the business continuity planning are assessed. The negative outcomes are addressed and the improvements are continually made. Keeping this in mind, UAL has continued to engage in innovation and has created a customer...
(Hermann, 2008) (Gavito, 2013)
Use of Bluetooth, Wi-Fi and RFID
Usage of RFID is very beneficial for airlines. There is a plethora of mishandled baggage each year. The airlines face losses for every mishandled bag and traditional bar code tags are useless in finding out missing luggage. A solution to this is RFID baggage tags. These tags contain RFID chips which can be traced and therefore mishandled luggage can be avoided. (Ben-Yosef, 2005)
The United Airlines, with the help of airports and other aviation authorities, can install Bluetooth beacon technology. These beacons can be installed in the airports and every time a passenger, with a device having Bluetooth, comes into the proximity of the beacon, a message will be triggered containing information about the flight and other things. Wi-Fi technology is also being used to provide the passengers with internet facility. (Ben-Yosef, 2005)
The extensive use of IT in airlines has opened doors to cyber-crime. The airlines have to be cautious as it handles the information of customers. Software and protocols should be designed to avoid unauthorized access. In addition, the aircraft's IT components should also be updated for security threats. The airline should also be clear about any changes in the IT components of the aircraft so that accidents are avoided. (Iasiello, n.d.)
Abdollahi, G., & Leimstoll, U. (2011). A Classification for Business Model Types in E-commerce.
Ben-Yosef, E. (2005). The Evolution of the U.S. Airline Industry (1st ed.). [New York]: Springer.
Boland, D., Morrison, D., & O'Neill, S. (2002). The future of CRM in the airline industry: A new paradigm for customer management (1st ed., pp. 6-7). New York: International Business Machines Corporation. Retrieved from http://www-05.ibm.com/innovation/nl/pdf/highlights/integration/crm_airline.pdf
Entrekin, L., & Scott-Ladd, B. (2013). Human Resource Management (1st ed., pp. 6-128). Hoboken: Taylor and Francis.
Gavito, G. (2013). Business Continuity Disaster Recovery & Emergency Response (pp. 1-9). Chicago: United Airlines.
Hermann, P. (2008). When disaster strikes - A guideline to business continuity awareness (1st ed.). Mu-nchen: GRIN Verlag GmbH.
Iasiello, E. A Review of "A Framework for Aviation Cybersecurity" -- A Decision Paper from the American Institute of Aeronautics and Astronautics. Journal Of Homeland Security And Emergency Management, 1 -- 6.
Kim, J. (2014). An Agent-based Model for Airline Evolution, Competition andAirport Congestion (1st ed., pp. 5-11). Charlottesville: Virginia Polytechnic Institute. Retrieved from http://scholar.lib.vt.edu/theses/available/etd-06032005-165152/unrestricted/Dissertation_Kim.pdf
Lochab, P. (2010). The Supply Chain Paradigm (pp. 2-9). Chicago: United Airlines.
Mazzeo, M. (2003). Competition and service quality in the U.S. airline industry. Review Of Industrial Organization, 22(4), 275 -- 296.
Miller, A., & Dess, G. (1993). Assessing Porter's (1980) model in terms of its generalizability, accuracy and simplicity. Journal Of Management Studies, 30(4), 553 -- 585.
Radack, S. (2002). The System Development Life Cycle (SDLC). Communications.
Stone, M., Bond, A., & Foss, B. (2004). Consumer insight (1st ed.). London: Kogan Page.
Van Decker, J. (2009). United Airlines Improves Reconciliation Management by Leveraging Technologies (1st ed.,…
This approach to creating cyclically-based strategies has helped to alleviate the time constraints on companies over time when it comes to managing the process of education and gaining senior management commitment. The smaller incremental gains made in these smaller organizations have actually proven to be more effective at deterring potential threats as knowledge is accumulated over time and change is gradual (Botha, Von Solms, 2004). The studies that are
component of effective incident handling is a security management team that is engaged in constant preparation and network scanning for such a breach. "Once your security team declares there has been a breach, it should inform the incident management team, and it should assemble within minutes" (Schilling, 2013, p.3). The team should then conduct "network forensics, systems forensics and malware analysis" to understand the extent of the threat and
Business Continuity Planning, Collaboration, and Training Help Private Agencies Prepare for Events Affecting Critical Infrastructure A business continuity plan is a response plan that sets out how an organization or institution will continue operations after a disruption. Business continuity planning, therefore, is the process of identifying both the external and internal threats that may affect these organizations and institutions, and setting out a detailed plan of how they will operate
Business Continuity Planning Incident Handling Incident response refers to an organized approach used to manage and address the security breach aftermath of the attack. The goal of incident response is to limit the damages to the network infrastructures as well as reducing costs and time employed for recovery of critical data. The paper does not suggest that the organization should shut down the network systems because they may lose a substantial
DHS Introductions and Business Continuity Planning Strategy Department of Homeland Security: Continuity Plans Continuity planning is an essential component of the Department of Homeland Security. Annual Department of Homeland Security (DHS) continuity planning exercises "test the readiness and capabilities of federal departments and agencies -- coordinating with the White House -- to execute their Continuity of Operations (COOP) plans" (Continuity plans, 2009, DHS). Additional exercises may be necessary in the wake of new threats
Business Continuity Plan (U.S. VISIT-DHS) Internal Key Personnel and Backups The aim of this business continuity is to guarantee continuous business operations of the US_VISIT (DHS) whenever disasters strike. Through this business continuity plan, the company has higher chances of prevailing during the disasters or financial crisis. In times of crisis or emergency within operations, the following key personnel would retain their positions within the company. This indicates that they are extensive