Posted on

Assessment Brief
Case Study:
Kuraba is a ride-hailing company based in the UK. The company has recently
exceeded $500 million in revenue (2020) and now employs over 5,000 people. Given
the platform’s efficiency in delivering services on-location, such as a taxi service app,
the company’s digital labour platform has played a significant role in their recent
success. However, the company recently faced a series of information challenges that
raised various information security risks, such as a system breach that exposed
personal information to online attackers.
The root cause of this issue was a misalignment between business and IT strategy, in
which outdated security features of the digital labour platform had led to the breach.
Despite the IT department’s enquiries to update the platform, which first needs
approval from senior management, the IT department’s efforts have come to no avail
due to the lack of response. Therefore, the maintenance requirements and inflexibility
of the outdated system had left the IT department in handcuffs, preventing them from
providing the company with modern strategies and solutions to minimise information
security risk. However, recently, senior management have been pressurised by the IT
department to tackle this problem in the event of the recent information breach.
This, as well as being heavily fined by the Information Commissioner’s office for the
recent security blunder, senior management have finally responded to the IT
department’s enquiries and requests a report that proposes a potential information
security solution. Accordingly, the company has requested your assistance as a
business IT consultant in developing an alternative information security strategy to
reform the company’s digital labour platform.
Your Task:
Considering the above case study, your task is to critically assess the information
risks/challenges of the existing system to determine the deeper reasons why the
information breach occurred.
Based on these risks, devise a contemporary information systems/security strategy
report to the company, considering the alignment of business and IT strategy
(2,500 words). Use appropriate risk methodologies to support your analysis,
while making appropriate recommendations where necessary.
Essential Content:
• Introduction
• Contents page
• Main body:
1) Critical assessment of the existing information risks/challenges of the digital
platform supported by appropriate models and frameworks;
2) Devise an alternative IS strategy that considers the alignment of business and
IT needs; choose appropriate alternative platforms and justify their feasibility
to the company;
3) Other contemporary IS strategic options you may consider (optional) d)
Provide recommendations based on your strategic analysis.
• Conclusion
• Bibliography
• Appendices
Assignment Guidance:

  1. You will be able to access tutorials and group discussions as part of the blended
    learning approach. Please note, you will need to consider key areas of IS/IT
    strategy and relevant models/theories, while applying and aligning these to a case
    study.
  2. Ensure your in-text citations and bibliography (alphabetical order) follow Harvard
    Referencing Style requirements.
    Secondary Research – It is expected that the Reference List will contain between
    fifteen to twenty sources. As a MINIMUM the Bibliography should include three
    refereed academic journals and five academic books.

Type of service: Academic Paper Report
Type of assignment: Essay
Subject: Business
Pages/words: 10/2750
Number of Sources: 20
Academic level: Undergraduate
Paper Format: Harvard
Line spacing: Double
Language style: UK English