Monday, February 24, 2020

CEO of Continental Airlines - Larry Kellner Research Paper

CEO of Continental Airlines - Larry Kellner - Research Paper Example development with the airline from joining to becoming CEO in December 2004 with particular reference to management style of the US airline, particularly in a tough market. It is submitted at the outset that Kellner’s management style at Continental Airlines highlights the importance of implementing an efficient interrelationship between creativity at business operational level, employee relations and customer relationship management (CRM). Accordingly, in Section 2 I shall firstly present a summary of Kellner’s career charting his graduation from South Carolina University to an exemplary career in private equity. This will be followed by a discussion of his eventual move to Continental Airlines and role in the continued growth of Continental Airlines and air transportation. In Section 3, I shall evaluate Kellner’s role and management philosophy in running Continental Airlines and how this has benefited the company in tough market conditions including increasing competition, personnel management and burgeoning oil prices. Kellner’s career in private equity and as business strategist has been prolific and the Business Week (2009) Executive Profile highlights the Kellner’s achievements as graduate from South Carolina University and recipient of the distinguished alumni award in 1998 (www.investing.businessweek.com). After graduating in a Bachelor of Science and Business administration degree, Kellner worked for and became Executive Vice President and Chief financial Officer of the Koll Company followed by his appointment as Executive Vice President and Chief financial officer of American Savings Bank FA from November 1992 to May 1995 (www.investing.businessweek.com). Mr Kellner joined Continental Airlines in 1995 and became director in 2001, going onto replace Gordon Bethune as CEO in December 2004. Kellner recently announced his departure from Continental airlines; however his role at Continental has been heralded as being a prime example of successful

Friday, February 7, 2020

Computer laws in US. Computer Fraud and Abuse Act Research Paper

Computer laws in US. Computer Fraud and Abuse Act - Research Paper Example Just like any other invention, computers have two sides; the positive and the negative side. The positive side is where business flourish, scientists do more invention and government offer better services while on the other hand, it gives criminals an extra tool to commit more crimes and get away with it. Computer crimes have been on rapid increase since the advent of intern. Internet has facilitated the criminal activities as a means of access other people’s computers regardless of geographical location. Crimes such as cyber-stalking, child pornography, fraud and scams, hacking copyright violations, malicious code are some of the computer crimes that are now easily committed because of the internet. Compute crimes are unavoidable to organizations that use IT in delivering their services and products. Computer professional therefore should ensure that there are frameworks put in place to protect and face these challenges through laws. This paper will identify and detail some o f the computer laws put in place by US federal legislation. Computer laws face greater challenge because of the dynamic nature of computer crimes because of the new and evolving technologies. The wire fraud statute was the first law in the US used to prosecute computer criminals. This law prohibited the use of communication wires that are used in the international commerce with an attempt to commit a fraud. This law is still in place and is used to date to prosecute computer criminals.... The challenges with the initial structure of CFAAA was that to successfully prosecute fraud charges, one must provide evidence that the suspect gained unauthorized access into the computer system (CFAA, 1986). Have a clause that touched on the method of entry into the computer system rather than focusing on the computer usage was a loophole for crimes committed by insiders. An employee within the company who has legal access to the computer can also commit a crime using the computer. Since it will not be proved that he/she had illegal access, then such person will not be prosecuted. CFAA was modified for the second time in 1994 so as to deal with the act of malicious code such as viruses, worms and other programs designed with an aim of changing or damaging data on the computer (Title 18 U.S.C section 1030). This amendments enhanced the law because initially it focused on the access to the computer system without looking at how the computer system was used. The law was now able to pr osecute those who executed illegal or malicious programs on computers with indention of causing damage to data or the computer. There are several acts that have been passed to add strength or deal with loopholes in CFAA. The National Information Act (NIIA) was enacted in 1996 to protect computer systems against those who access them using other people’s authorization. Penalties under CFAA Offense Minimum sentence Maximum sentence Getting national security information 10 year 20 years Unauthorized access in government computer 1 year 10 years Knowing access and damage 1 year 10 years Knowing access and reckless damage 5 years 20 years Trafficking in passwords 1 year 10 years Extortion involving threats of damage computer 5 years 10 years Theofel v. Farey-Jones in 2003 is a