Significance of Information Security in Retail Industry - Case Study of Marks and Spencer

Verified

Added on  2023/01/12

|7
|1361
|50
AI Summary
This document explores the significance of implementing information security measures to reduce the risks of digital attacks and enhance customer trust in the retail industry. It presents a case study of Marks and Spencer, discussing the role of information security in building customer trust, ways to eliminate the danger of digital attacks, and various information security frameworks that can be adopted.

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Corporate Strategy and
Governance
1

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Table of Contents
TOPIC - To examine the significance of executing information security viewpoints while
overseeing methods to decrease dangers of advanced ambushes to improve client trust in retail
industry of United Kingdom. A case study of Marks and Spencer.................................................3
INTRODUCTION/ BACKGROUND.............................................................................................3
Research Aims............................................................................................................................3
Research Objectives....................................................................................................................3
Research Questions.....................................................................................................................3
LITERATURE REVIEW................................................................................................................4
Comprehend the job of information security in building client trust for an organization..........4
Various routes through which danger of advanced attacks can be wiped out for Marks and
Spencer's clients..........................................................................................................................4
Various information security frameworks that can be embraced by Marks and Spencer to
develop client trust and lessening peril of data breaks and computerized ambushes.................4
RESEARCH METHODOLOGY.....................................................................................................5
REFERENCES................................................................................................................................7
2
Document Page
TOPIC - To examine the significance of executing information security
viewpoints while overseeing methods to decrease dangers of advanced
ambushes to improve client trust in retail industry of United Kingdom. A
case study of Marks and Spencer.
INTRODUCTION/ BACKGROUND
Data Security is present time, can be defined as an effective process which protects
information like personal financial accounts, security numbers and more from unauthorized
individuals. Basically, data security can help Marks and Spencer in reaching to an all new level
of serving the best to customers in relation to data protection (Sadgrove, 2016).
Research Aims
To examine the significance of executing information security viewpoints while
overseeing methods to decrease dangers of advanced ambushes to improve client trust in
retail industry of United Kingdom. A case study of Marks and Spencer.
Research Objectives
To comprehend the job of information security in building client trust for an organization.
To examine the various routes through which danger of advanced attacks can be wiped
out for Marks and Spencer's clients.
To recognize the various information security frameworks that can be embraced by
Marks and Spencer to develop client trust and lessening peril of data breaks and
computerized ambushes.
Research Questions
What are the role of data security in building customer trust for a company ?
What are the different ways through which risk of digital assaults can be eliminated for
Marks and Spencer's customers ?
What are the various data security systems that can be adopted by Marks and Spencer to
build up customer trust and reducing digital assaults and danger of information breaks ?
3
Document Page
LITERATURE REVIEW
Comprehend the job of information security in building client trust for an organization
According to CXOtoday, (2018), in the midst of a constant stream of features about
significant information breaks in big business and government offices, how much customers
have set their trust in associations to ensure their by and by recognizable data (PII) online has
never been increasingly pertinent. On the other hand, it is vital for business pioneers to
comprehend overall open slant concerning the sharing of data on the web, and the effect of
information and protection breaks on the organization's main concern. Some of the roles of data
security are mentioned underneath:
Ensure Business Continuity
Avoid Data Breaches
Prevent Unauthorized Access
Various routes through which danger of advanced attacks can be wiped out for Marks and
Spencer's clients
According to Kitchin, (2016), every single business organisation looks forward to deliver
proper customers support in relation to security and safety as well. In the same way, Marks and
Spencer would require to various awareness related campaigns in relation to digital assaults,
where they could deliver the information about how hackers can drudge personal information
and blackmail them. This is where, instructions that can be provided by company is to change
passwords of there personal accounts on online stores and so on.
Various information security frameworks that can be embraced by Marks and Spencer to develop
client trust and lessening peril of data breaks and computerized ambushes
As mentioned by Safa, Von Solms and Furnell, (2016), there are ample number of data
security systems that can be considered by Marks and Spencer in order to build the trust among
customers. Some of the data security systems are presented underneath:
Data Privacy Software
Data Center Security Software
Cloud Security Software
Internal Communications Software
Backup Software
4

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
RESEARCH METHODOLOGY
Research approach: Current research will be focused on an inductive method to
identifying the different individuals interaction emphasis problem. This approach helps define
the latest strategies and new tools for management. To meet the demands and handle complete
sources of activities to determine the successful sources of problem recognition.
Research Design: This investigating research will consider exploratory investigating
design. The reason behind utilising this design as it will help investigator in conducting
investigation on a particular topic that has been taken into consideration so that appropriate
outcomes could effectively be grabbed. Away with this, exploratory research would also aid in
exploring and managing a proper successful business growth.
Research philosophy: Every researcher requires adopting their one philosophy of the
study to conduct the research approach out of two methods Positivism and Interpretivism.
Positivism philosophy based on real things or on the facts which has been existed. It helped
researcher to collects number of data and information through observation. On the contrary,
Interpretivism adopt approach which taking the involvement of human interest. Present study
will be using Interpretivism approach style to conduct the best services or goals.
Data collection: This is said to be one of the crucial element for a researcher within the
methodology chapter of a research. Basically, data can be collected with the help of primary and
secondary data, where qualitative along with the quantitative are the two specific methods, that
are utilised by researchers. Under this investigation, quantitative approach is utilised where data
is going to be collected by primary data collection tool i.e. questionnaire. Including this, while
conducting the literature review, secondary approach is specifically utilised that would lead
researcher to better understanding of the study. Therefore, present investigating study is
specifically taken into consideration of both primary & secondary data collection tool as well.
Data analysis: In an investigation, it is said that evaluation of data considering both
logical along with the analytical rational takes place, where examination in relation to every
single component could easily be collected and offered to the researcher right on time (Saberi
and et. al., 2019).
Sampling: Including this, within present investigation it is said that non-probability
sampling has been taken into consideration, which will lead researcher to pull out favourable
5
Document Page
outcomes right on time. Here, 20 customers has been utilised within random sampling
methodology.
Ethical consideration: On the other hand, it is said that ethics are very much crucial in
today's investigating research process which has helped organisation in keeping all the different
activities in relation to safety and security at the same time.
6
Document Page
REFERENCES
Books and Journals
Sadgrove, K., 2016. The complete guide to business risk management. Routledge.
Kitchin, R., 2016. Getting smarter about smart cities: Improving data privacy and data security.
Safa, N. S., Von Solms, R. and Furnell, S., 2016. Information security policy compliance model
in organizations. computers & security. 56. pp.70-82.
Saberi, S. and et. al., 2019. Blockchain technology and its relationships to sustainable supply
chain management. International Journal of Production Research. 57(7). pp.2117-2135.
Online
Best Data Security Software. 2020. Available through: <https://www.g2.com/categories/data-
security>.
7
1 out of 7
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]