Implementing Data Security for Customer Trust in UK Retail
VerifiedAdded on 2023/01/12
|29
|8135
|23
AI Summary
This document discusses the importance of implementing data security measures to reduce the risk of digital assaults and information breaks in the UK retail industry. It presents a case study of Marks and Spencer and explores different ways to build customer trust through data security systems.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Corporate Strategy and
Governance
1
Governance
1
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Table of Contents
TOPIC - Implementing data security the management procedure to lessen and reduce the danger
of information breaks and digital assaults to improve customer trust in the UK retail. A case
study of Marks and Spencer.............................................................................................................4
INTRODUCTION...........................................................................................................................4
Background of the research....................................................................................................4
Background of the company...................................................................................................5
Significance of investigation..................................................................................................5
Research Aims........................................................................................................................5
Research Objectives...............................................................................................................5
Research Questions................................................................................................................6
Rationale of the investigation.................................................................................................6
LITERATURE REVIEW................................................................................................................6
Role of data security in building customer trust for a company.............................................7
Different ways through which risk of digital assaults can be eliminated for Marks and
Spencer's customers................................................................................................................7
Various data security systems that can be adopted by Marks and Spencer to build up customer
trust and reducing digital assaults and danger of information breaks....................................8
RESEARCH METHODOLOGY.....................................................................................................9
Type of Investigation..............................................................................................................9
Research Design...................................................................................................................10
Research Philosophy............................................................................................................10
Research Approach...............................................................................................................10
Data Collection.....................................................................................................................11
Sampling...............................................................................................................................11
DATA ANALYSIS........................................................................................................................13
FREQUENCY TABLE........................................................................................................13
THEMATIC ANALYSIS.....................................................................................................15
CONCLUSION..............................................................................................................................25
REFLECTION......................................................................................................................25
2
TOPIC - Implementing data security the management procedure to lessen and reduce the danger
of information breaks and digital assaults to improve customer trust in the UK retail. A case
study of Marks and Spencer.............................................................................................................4
INTRODUCTION...........................................................................................................................4
Background of the research....................................................................................................4
Background of the company...................................................................................................5
Significance of investigation..................................................................................................5
Research Aims........................................................................................................................5
Research Objectives...............................................................................................................5
Research Questions................................................................................................................6
Rationale of the investigation.................................................................................................6
LITERATURE REVIEW................................................................................................................6
Role of data security in building customer trust for a company.............................................7
Different ways through which risk of digital assaults can be eliminated for Marks and
Spencer's customers................................................................................................................7
Various data security systems that can be adopted by Marks and Spencer to build up customer
trust and reducing digital assaults and danger of information breaks....................................8
RESEARCH METHODOLOGY.....................................................................................................9
Type of Investigation..............................................................................................................9
Research Design...................................................................................................................10
Research Philosophy............................................................................................................10
Research Approach...............................................................................................................10
Data Collection.....................................................................................................................11
Sampling...............................................................................................................................11
DATA ANALYSIS........................................................................................................................13
FREQUENCY TABLE........................................................................................................13
THEMATIC ANALYSIS.....................................................................................................15
CONCLUSION..............................................................................................................................25
REFLECTION......................................................................................................................25
2
Recommendations................................................................................................................26
Conclusion............................................................................................................................26
REFERENCES..............................................................................................................................26
3
Conclusion............................................................................................................................26
REFERENCES..............................................................................................................................26
3
TOPIC - Implementing data security the management procedure to lessen
and reduce the danger of information breaks and digital assaults to
improve customer trust in the UK retail. A case study of Marks and
Spencer.
INTRODUCTION
In current scenario, retail industry is dealing with ample number of issues where,
customer trust is one of it, that impacts upon companies’ productivity and profitability in both
positive and in negative manner as well. Basically, customer trust can be defined as interactive
behaviour to what they receive (ur Rehman and et. al., 2016). Away with this, it has been
analysed that trust comes within customers when a company understand their requirements &
also offer them with appropriate services based on their own needs and wants. Due to change in
course, it has been analysed that people's mindset is continuously shifting towards online portals
where they can buy and sell products and services. This also raised different data security, which
can be considered as the increasing numbers of digital assaults along with the danger of
information breaks (Tian, 2017). There are many cyber cases and digital assaults related cases
came in front, which impacted negatively upon customer's behaviour towards purchasing
different range of products and services through online portals. Because, personal information,
financial accounts related data and more could be accessed by an unauthorized person for a
particular reason i.e. stealing money through online channels.
Background of the research
Over the years, data security has been a crucial subject for researchers to conduct
investigation and to bring out favourable outcomes. But it is said that due to rise among different
concern, this subject has become an on going threat for all the business organisations among
different retail industry (Raipurkar and Deorankar, 2016). Including this, data protection related
systems has helped businesses, which is also needed by a business organisation like Marks and
Spencer to reduce the risks of cyber assaults, information breaks and so on. Due to this specific
reason, many of customers chain of a different companies within retail industry got break
(Kourid and Chikhi, 2018). This affected company's performance level, productivity and
4
and reduce the danger of information breaks and digital assaults to
improve customer trust in the UK retail. A case study of Marks and
Spencer.
INTRODUCTION
In current scenario, retail industry is dealing with ample number of issues where,
customer trust is one of it, that impacts upon companies’ productivity and profitability in both
positive and in negative manner as well. Basically, customer trust can be defined as interactive
behaviour to what they receive (ur Rehman and et. al., 2016). Away with this, it has been
analysed that trust comes within customers when a company understand their requirements &
also offer them with appropriate services based on their own needs and wants. Due to change in
course, it has been analysed that people's mindset is continuously shifting towards online portals
where they can buy and sell products and services. This also raised different data security, which
can be considered as the increasing numbers of digital assaults along with the danger of
information breaks (Tian, 2017). There are many cyber cases and digital assaults related cases
came in front, which impacted negatively upon customer's behaviour towards purchasing
different range of products and services through online portals. Because, personal information,
financial accounts related data and more could be accessed by an unauthorized person for a
particular reason i.e. stealing money through online channels.
Background of the research
Over the years, data security has been a crucial subject for researchers to conduct
investigation and to bring out favourable outcomes. But it is said that due to rise among different
concern, this subject has become an on going threat for all the business organisations among
different retail industry (Raipurkar and Deorankar, 2016). Including this, data protection related
systems has helped businesses, which is also needed by a business organisation like Marks and
Spencer to reduce the risks of cyber assaults, information breaks and so on. Due to this specific
reason, many of customers chain of a different companies within retail industry got break
(Kourid and Chikhi, 2018). This affected company's performance level, productivity and
4
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
profitability as well. Many of the hackers has breached the law, which involved the loss of
client's data from hacking or leaking rose from 19 in 2015/16 to 38 in 2016/17.
Background of the company
Marks and Spencer Group plc (M&S), which is one of the famous fast fashion retailer in
all over the world was found in the year of 1884 by Thomas Spencer and Michael Marks. At
present company headquartered at Westminster, London. Including this, organisation is also
dealing among different areas like home along with the food related final goods, which raised
ample number of benefits for the company and became much more influential within the retail
industry and raised various benefits for its own. Recently, company has gone through different
issues like digital assaults and raised information breaks related cases. This is where, M&S has
impacted negatively upon its own overall performance level. Also, it has been found that
company has adopted a range of data security systems, that are offering them right information
related to personal data of their customers and protected them in a rightful manner as well.
Significance of investigation
Primal reason behind conducting investigation on present topic, is because customers
loyalty is much important for a business organisation when it comes to grab great number of
opportunities in today's business environment (Fernando, Chidambaram and Wahyuni-TD,
2018). Also, it is said that many hackers are sitting in all over the world and continuously
breaching laws in relation to data security of customers. This has impacted upon their trust and
raised many concerns while purchasing products and services when a company is not having
effective security system.
Research Aims
This is one of the crucial elements of a particular investigation, where if researcher do not
develop an aim, then it is may be possible that, he/she might go through different issues (Suki
and Suki 2017). Primal aim of this investigation is “To analyse the importance of implementing
data security aspects while managing procedures to reduce risks of digital assaults to improve
customer trust in the UK retail. A case study of Marks and Spencer.”.
Research Objectives
To understand the role of data security in building customer trust for a company.
5
client's data from hacking or leaking rose from 19 in 2015/16 to 38 in 2016/17.
Background of the company
Marks and Spencer Group plc (M&S), which is one of the famous fast fashion retailer in
all over the world was found in the year of 1884 by Thomas Spencer and Michael Marks. At
present company headquartered at Westminster, London. Including this, organisation is also
dealing among different areas like home along with the food related final goods, which raised
ample number of benefits for the company and became much more influential within the retail
industry and raised various benefits for its own. Recently, company has gone through different
issues like digital assaults and raised information breaks related cases. This is where, M&S has
impacted negatively upon its own overall performance level. Also, it has been found that
company has adopted a range of data security systems, that are offering them right information
related to personal data of their customers and protected them in a rightful manner as well.
Significance of investigation
Primal reason behind conducting investigation on present topic, is because customers
loyalty is much important for a business organisation when it comes to grab great number of
opportunities in today's business environment (Fernando, Chidambaram and Wahyuni-TD,
2018). Also, it is said that many hackers are sitting in all over the world and continuously
breaching laws in relation to data security of customers. This has impacted upon their trust and
raised many concerns while purchasing products and services when a company is not having
effective security system.
Research Aims
This is one of the crucial elements of a particular investigation, where if researcher do not
develop an aim, then it is may be possible that, he/she might go through different issues (Suki
and Suki 2017). Primal aim of this investigation is “To analyse the importance of implementing
data security aspects while managing procedures to reduce risks of digital assaults to improve
customer trust in the UK retail. A case study of Marks and Spencer.”.
Research Objectives
To understand the role of data security in building customer trust for a company.
5
To analyse the different ways through which risk of digital assaults can be eliminated for
Marks and Spencer's customers.
To identify the different data security systems that can be adopted by Marks and Spencer
to build up customer trust and reducing danger of information breaks & digital assaults.
Research Questions
What are the role of data security in building customer trust for a company ?
What are the different ways through which risk of digital assaults can be eliminated for
Marks and Spencer's customers ?
What are the various data security systems that can be adopted by Marks and Spencer to
build up customer trust and reducing digital assaults and danger of information breaks ?
Rationale of the investigation
Specific reason behind why the topic has been taken into consideration is because data
security systems is something that lead various business organisations to save their customers
from different cyber attacks, data solids digital assaults and eliminated them from various other
risks as well (Varghese and Sudhahar, 2018). Over the years, various business organisations like
Tesco, Marriott International, and many more other like Zara has built an effective security
system so that no data related leaks may take place.On the other hand, another reason that has
been identified over of considering this investigating topic is because of the self interest of the
investigator (Goldfeder and et. al, 2017). Basically, there are many business organisations that
has led companies to go through various issues, which raised the interest of the investigator in
order to gain appropriate knowledge for the better opportunities in near future and to reduce the
number of trees that are directly linked with digital assaults and many other risks like danger of
information break and so on. If it is talked about the future then, the risk of these measures
related to online shopping and will increase, it is required by companies to deliver the best
services to customers so that competitive advantages could easily be gained (Dlamini and
Johnston, 2016).
LITERATURE REVIEW
This section consists of a crucial part of the whole investigation, as it consists of, methodical and
reproducible technique for deciding, looking at and furthermore orchestrating the current
assortment of recorded work created by researchers, experts and examiners (Khan and et. al.,
6
Marks and Spencer's customers.
To identify the different data security systems that can be adopted by Marks and Spencer
to build up customer trust and reducing danger of information breaks & digital assaults.
Research Questions
What are the role of data security in building customer trust for a company ?
What are the different ways through which risk of digital assaults can be eliminated for
Marks and Spencer's customers ?
What are the various data security systems that can be adopted by Marks and Spencer to
build up customer trust and reducing digital assaults and danger of information breaks ?
Rationale of the investigation
Specific reason behind why the topic has been taken into consideration is because data
security systems is something that lead various business organisations to save their customers
from different cyber attacks, data solids digital assaults and eliminated them from various other
risks as well (Varghese and Sudhahar, 2018). Over the years, various business organisations like
Tesco, Marriott International, and many more other like Zara has built an effective security
system so that no data related leaks may take place.On the other hand, another reason that has
been identified over of considering this investigating topic is because of the self interest of the
investigator (Goldfeder and et. al, 2017). Basically, there are many business organisations that
has led companies to go through various issues, which raised the interest of the investigator in
order to gain appropriate knowledge for the better opportunities in near future and to reduce the
number of trees that are directly linked with digital assaults and many other risks like danger of
information break and so on. If it is talked about the future then, the risk of these measures
related to online shopping and will increase, it is required by companies to deliver the best
services to customers so that competitive advantages could easily be gained (Dlamini and
Johnston, 2016).
LITERATURE REVIEW
This section consists of a crucial part of the whole investigation, as it consists of, methodical and
reproducible technique for deciding, looking at and furthermore orchestrating the current
assortment of recorded work created by researchers, experts and examiners (Khan and et. al.,
6
2016). In doing this examination, the auxiliary technique has been utilized by thinking about
various hotspots for diaries, books, articles, and so on.
Role of data security in building customer trust for a company
According to Wollenburg 2018, data security refers to protecting computer, databases
and websites from unauthorised access and data corruption. This security prevent data from
accidental destruction, disclosure and protects data across all applications and platforms. This
reduce the risk that comes at the time of data sorting. Elements of data security are
confidentiality, integrity, and availability. This is an important aspect of IT companies, they
develop data security solutions like tokenisation, data encryption, that protects data. On the other
hand, if it is talked about the importance of Data Security, then it is said that data along with the
information within businesses is important so there is need to secure or preventing the data or the
information from unauthorised access (Hamidi and Moradi, 2017). It is necessary in today's
world to protect different computers along with the, tablet, mobile data and so on.
Many people have misunderstanding that data security is useful for only businesses,
organizations, government but it is useful for every device. It help in backing up and recovery of
data. Provide protection from virus and spams. It reorganize and store digital information. On the
other hand, if it is talked about the role of data security, then this type of security helps a
company in It provides full security to different range of devices. It helps in protecting
information, files, accounts related to the business (Alamsyah, Trijumansyah and Hariyanto,
2017). Keeping the data along with the information confidential. Ensure integrity and availability
of data. It is also said that device start working smoothly with use of data security. It also
protects the device from various malware practises. Away with this, it is also said that consumer
product executives should consider viewing data privacy and security not just as a risk
management issue, but as a potential source of competitive advantage that may be a central
component of brand-building and corporate reputation. Basically, customer loyalty all trust
specifically depends upon security measures, that has been adopted by business organisations
(Duarte, e Silva and Ferreira, 2018).
Different ways through which risk of digital assaults can be eliminated for Marks and Spencer's
customers
According to Farshidi 2016, there are number of ways by an organisation can effectively reduce
the number of cyber attacks and digital assaults and some of these are using patches, protecting
7
various hotspots for diaries, books, articles, and so on.
Role of data security in building customer trust for a company
According to Wollenburg 2018, data security refers to protecting computer, databases
and websites from unauthorised access and data corruption. This security prevent data from
accidental destruction, disclosure and protects data across all applications and platforms. This
reduce the risk that comes at the time of data sorting. Elements of data security are
confidentiality, integrity, and availability. This is an important aspect of IT companies, they
develop data security solutions like tokenisation, data encryption, that protects data. On the other
hand, if it is talked about the importance of Data Security, then it is said that data along with the
information within businesses is important so there is need to secure or preventing the data or the
information from unauthorised access (Hamidi and Moradi, 2017). It is necessary in today's
world to protect different computers along with the, tablet, mobile data and so on.
Many people have misunderstanding that data security is useful for only businesses,
organizations, government but it is useful for every device. It help in backing up and recovery of
data. Provide protection from virus and spams. It reorganize and store digital information. On the
other hand, if it is talked about the role of data security, then this type of security helps a
company in It provides full security to different range of devices. It helps in protecting
information, files, accounts related to the business (Alamsyah, Trijumansyah and Hariyanto,
2017). Keeping the data along with the information confidential. Ensure integrity and availability
of data. It is also said that device start working smoothly with use of data security. It also
protects the device from various malware practises. Away with this, it is also said that consumer
product executives should consider viewing data privacy and security not just as a risk
management issue, but as a potential source of competitive advantage that may be a central
component of brand-building and corporate reputation. Basically, customer loyalty all trust
specifically depends upon security measures, that has been adopted by business organisations
(Duarte, e Silva and Ferreira, 2018).
Different ways through which risk of digital assaults can be eliminated for Marks and Spencer's
customers
According to Farshidi 2016, there are number of ways by an organisation can effectively reduce
the number of cyber attacks and digital assaults and some of these are using patches, protecting
7
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
outbound data, and so on. In the same way, Marks and Spencer can also protects itself from
various digital assaults that may reduce the fate of customers from services offered by them. A
few of these ways are are mentioned underneath:
Tightening marks and Spencer’s current security system, can help the company in
maximizing the security controls through improvising the number of guidelines that were
already existed (Iglesias and et. al., 2018). This can be done through turning off the
unnecessary services offered by the company which may also enhance the security
control over personal information of the customers and it will also lead them to to support
customer so that they can rely upon them.
Protecting outbound data is also another crucial way through which Marks and Spencer
can effectively protect its system from various malware and bots considering a firewall.It
is required by Marks and Spencer 2 to keep on releasing the information to employees
who are honest so that sensitive data or malicious software could not take place within
the network system (Chou, Chuang and Shao, 2016).
Development of a password policy can also be considered as one of the crucial strategies
that can be adopted by Marks and Spencer organisations has already developed this kind
of strategy which helps them in becoming a lot about security issues if any e
malfunctioning takes place (Castaldo and et. al., 2016). therefore, it is required by Marks
and Spencer to keep on delivering the information to their customers to change the PC
password, mobile passwords and other application passwords so that external Havoc
cannot takes place.
Various data security systems that can be adopted by Marks and Spencer to build up customer
trust and reducing digital assaults and danger of information breaks
According to Barnes, 2016 Information protection and security is about significantly more
than keeping programmers under control. It is likewise about guaranteeing customers that the
trust they place in a shopper item brand is justified. The aftereffects of an ongoing review of
shoppers and officials show that buyers have a sharp feeling of attention to the dangers
encompassing information security and protection, and that numerous customer item
administrators are likely overestimating the degree to which they are meeting purchaser desires
identified with information security and security (Mylrea and Gourisetti, 2017). On the other
hand, numerous purchaser item officials might be disparaging the open door for upper hand
8
various digital assaults that may reduce the fate of customers from services offered by them. A
few of these ways are are mentioned underneath:
Tightening marks and Spencer’s current security system, can help the company in
maximizing the security controls through improvising the number of guidelines that were
already existed (Iglesias and et. al., 2018). This can be done through turning off the
unnecessary services offered by the company which may also enhance the security
control over personal information of the customers and it will also lead them to to support
customer so that they can rely upon them.
Protecting outbound data is also another crucial way through which Marks and Spencer
can effectively protect its system from various malware and bots considering a firewall.It
is required by Marks and Spencer 2 to keep on releasing the information to employees
who are honest so that sensitive data or malicious software could not take place within
the network system (Chou, Chuang and Shao, 2016).
Development of a password policy can also be considered as one of the crucial strategies
that can be adopted by Marks and Spencer organisations has already developed this kind
of strategy which helps them in becoming a lot about security issues if any e
malfunctioning takes place (Castaldo and et. al., 2016). therefore, it is required by Marks
and Spencer to keep on delivering the information to their customers to change the PC
password, mobile passwords and other application passwords so that external Havoc
cannot takes place.
Various data security systems that can be adopted by Marks and Spencer to build up customer
trust and reducing digital assaults and danger of information breaks
According to Barnes, 2016 Information protection and security is about significantly more
than keeping programmers under control. It is likewise about guaranteeing customers that the
trust they place in a shopper item brand is justified. The aftereffects of an ongoing review of
shoppers and officials show that buyers have a sharp feeling of attention to the dangers
encompassing information security and protection, and that numerous customer item
administrators are likely overestimating the degree to which they are meeting purchaser desires
identified with information security and security (Mylrea and Gourisetti, 2017). On the other
hand, numerous purchaser item officials might be disparaging the open door for upper hand
8
related with meeting purchaser assumptions about information protection and security. In order
to reduce all the risks that are present in today’s business world in relation to digital assaults
where personal information is utilised by hackers against the individuals where their life cannot
also may get in danger, in order to reduce these elements there are some of the security
measures, that can be adopted by Marks and Spencer and these are presented underneath:
Blockchain — As when the developments in blockchain has soared, safety is now one of
the most affected sectors. Blockchain may aid in such a variety of ways to enhance the data
privacy. Data about the Ledger can be used to log operation and monitor user access. Other
technologies can use blockchain to secure data concerning transactions or finances between
parties. Blockchain and related systems are popping up within security solutions designed for
everything from user authentication to building secure databases (Dabija and Bejan, 2017).
Big Data — Most information and data protection developments apply to Big Data
innovations. Such systems process, store and transmit huge quantities of data that must be
protected. Many methods are explicitly intended to protect large data caseloads, but others might
not being able to provide it (Dutta, Chauhan and Chauhan, 2017). Understanding the
shortcomings of current solutions will benefit companies and individuals aimed at protecting big
data.
Containerization — This type of application and connected microservices include a
range of safety-related advantages. Most organizations implement cloud-based processing or
recovery features which could be maintained in protected conditions. Containerized software
might also reduce information replication and delivery, or application.
Adaptive Authentication — Risk-based authentication as well as zero trust protection
mechanisms boost email archiving and customer experience by integrated encryption. Such
software track actions of users, certain computers, the geographical location as well as many
other variables in compiling risk scores (Garaus and Wagner, 2016). Members with increased
threat ratings will be asked and request passwords for full disk encryption to maintain exposure.
Registered users, operating with standard appsnormal tasks will not be inhibited in the slightest.
RESEARCH METHODOLOGY
It is clarified as arrangement of the more extensive standards from which specific techniques
might be determined to understand different issues inside extent of explicit control. It is specific
9
to reduce all the risks that are present in today’s business world in relation to digital assaults
where personal information is utilised by hackers against the individuals where their life cannot
also may get in danger, in order to reduce these elements there are some of the security
measures, that can be adopted by Marks and Spencer and these are presented underneath:
Blockchain — As when the developments in blockchain has soared, safety is now one of
the most affected sectors. Blockchain may aid in such a variety of ways to enhance the data
privacy. Data about the Ledger can be used to log operation and monitor user access. Other
technologies can use blockchain to secure data concerning transactions or finances between
parties. Blockchain and related systems are popping up within security solutions designed for
everything from user authentication to building secure databases (Dabija and Bejan, 2017).
Big Data — Most information and data protection developments apply to Big Data
innovations. Such systems process, store and transmit huge quantities of data that must be
protected. Many methods are explicitly intended to protect large data caseloads, but others might
not being able to provide it (Dutta, Chauhan and Chauhan, 2017). Understanding the
shortcomings of current solutions will benefit companies and individuals aimed at protecting big
data.
Containerization — This type of application and connected microservices include a
range of safety-related advantages. Most organizations implement cloud-based processing or
recovery features which could be maintained in protected conditions. Containerized software
might also reduce information replication and delivery, or application.
Adaptive Authentication — Risk-based authentication as well as zero trust protection
mechanisms boost email archiving and customer experience by integrated encryption. Such
software track actions of users, certain computers, the geographical location as well as many
other variables in compiling risk scores (Garaus and Wagner, 2016). Members with increased
threat ratings will be asked and request passwords for full disk encryption to maintain exposure.
Registered users, operating with standard appsnormal tasks will not be inhibited in the slightest.
RESEARCH METHODOLOGY
It is clarified as arrangement of the more extensive standards from which specific techniques
might be determined to understand different issues inside extent of explicit control. It is specific
9
systems which mostly used to decide, picked, process and furthermore break down data and
information about point (Joshi and Kadhiwala, 2017).
Type of Investigation
It is a strategy that an investigator has devised to collect data. The research methods
depend on kind of investigation on the basis of purpose of study. Qualitative and quantitative are
two different types of data collection methods.
Qualitative- This method gathers information that seeks to explain specific topic in detailed
manner. It helps in bring the in depth understanding of research questions (Jayapandian and et.
al., 2017).
Quantitative- Under this, data is produced in numerical manner and analysed by using statistical
and mathematical methods.
There has been qualitative research method used because it provides the better direction
about the particular area and also give better understanding.
Research Design
Another crucial aspect of research methodology, where configuration is ordered among three
significant perspectives Like Descriptive, exploratory and test inquire about structure (Singh,
Jeong and Park, 2016). Present of work engaging examination configuration is most reasonable
source as it is probably going to be utilized for qualitative or subject research and viable in
giving point by point examination with respect to the picked topic.
Research Philosophy
The area of reasoning is ordered among interpritivism and positivism theory. These two
are the key wellspring of gathering of information and right way. In the current territory of work
interpritivism reasoning has been applied by the investigator (Ramanathan, Subramanian and
Parrott, 2017). Thus it is the most appropriate cost for subjective research and aides in giving and
point by point examination on the Chosen topic. This segment is fruitful in giving definite
examination through investigation of the assessment of writers and journalists.
Research Approach
Research approach is their first as the major part of research procedure as it is powerful in
giving a reasonable course to the scientist to complete the work in right way. This area is isolated
among two significant research approach is their first as the crucial part of research procedure as
10
information about point (Joshi and Kadhiwala, 2017).
Type of Investigation
It is a strategy that an investigator has devised to collect data. The research methods
depend on kind of investigation on the basis of purpose of study. Qualitative and quantitative are
two different types of data collection methods.
Qualitative- This method gathers information that seeks to explain specific topic in detailed
manner. It helps in bring the in depth understanding of research questions (Jayapandian and et.
al., 2017).
Quantitative- Under this, data is produced in numerical manner and analysed by using statistical
and mathematical methods.
There has been qualitative research method used because it provides the better direction
about the particular area and also give better understanding.
Research Design
Another crucial aspect of research methodology, where configuration is ordered among three
significant perspectives Like Descriptive, exploratory and test inquire about structure (Singh,
Jeong and Park, 2016). Present of work engaging examination configuration is most reasonable
source as it is probably going to be utilized for qualitative or subject research and viable in
giving point by point examination with respect to the picked topic.
Research Philosophy
The area of reasoning is ordered among interpritivism and positivism theory. These two
are the key wellspring of gathering of information and right way. In the current territory of work
interpritivism reasoning has been applied by the investigator (Ramanathan, Subramanian and
Parrott, 2017). Thus it is the most appropriate cost for subjective research and aides in giving and
point by point examination on the Chosen topic. This segment is fruitful in giving definite
examination through investigation of the assessment of writers and journalists.
Research Approach
Research approach is their first as the major part of research procedure as it is powerful in
giving a reasonable course to the scientist to complete the work in right way. This area is isolated
among two significant research approach is their first as the crucial part of research procedure as
10
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
it is powerful in giving an unmistakable bearing to the specialist to complete the work in right
way (Toufaily and Pons, 2017). This segment is partitioned among deductive and inductive
research approach. The choice of approach depends on the sort of examination. In present
investigating topic, the exploration approach has been applied by the investigator as it is viable
for subjective examination and aides in giving definite data by the assistance of deciding
speculations and theory on chosen topic.
Data Collection
In the present area of work both primary as well as secondary source of data collection
sources are applied by the researcher as to gathering valid and reliable outcome. Primary source
is applied in the form of conducting survey with the help of implementing a questionnaire,
however in this questions are developed that covers aim and objectives of the research and on the
other side secondary sources are effective in execution of the section of literature review by
analysis of data gathered from secondary sources.
Sampling
Data Sampling Method Is indeed a key component in carrying out such an effective
examination. A researcher can't fully perform a study by bringing the thoughts of most of the
participants (Taylor, 2016). 2 main types of data sampling include probabilistic and non-
probabilistic sampling. Throughout this current research, its investigator has implemented a
random sampling approach to gather effective and efficient information by analyzing the views
of numerous participants chosen as just an important information source. For this sample group
of 40 participants that can provide information to complete the research.
QUESTIONNAIRE
Q1. Do you have any knowledge related to why it is important for a company to develop data
security related measures ?
a) Yes
b) No
Q2. As per your own point of view, do you think if customer's trust plays a crucial role for a
business company ?
11
way (Toufaily and Pons, 2017). This segment is partitioned among deductive and inductive
research approach. The choice of approach depends on the sort of examination. In present
investigating topic, the exploration approach has been applied by the investigator as it is viable
for subjective examination and aides in giving definite data by the assistance of deciding
speculations and theory on chosen topic.
Data Collection
In the present area of work both primary as well as secondary source of data collection
sources are applied by the researcher as to gathering valid and reliable outcome. Primary source
is applied in the form of conducting survey with the help of implementing a questionnaire,
however in this questions are developed that covers aim and objectives of the research and on the
other side secondary sources are effective in execution of the section of literature review by
analysis of data gathered from secondary sources.
Sampling
Data Sampling Method Is indeed a key component in carrying out such an effective
examination. A researcher can't fully perform a study by bringing the thoughts of most of the
participants (Taylor, 2016). 2 main types of data sampling include probabilistic and non-
probabilistic sampling. Throughout this current research, its investigator has implemented a
random sampling approach to gather effective and efficient information by analyzing the views
of numerous participants chosen as just an important information source. For this sample group
of 40 participants that can provide information to complete the research.
QUESTIONNAIRE
Q1. Do you have any knowledge related to why it is important for a company to develop data
security related measures ?
a) Yes
b) No
Q2. As per your own point of view, do you think if customer's trust plays a crucial role for a
business company ?
11
a) Yes
b) Maybe
c) No
Q3. Are existing data security systems used by Marks and Spencer can reduce the digital
assaults ?
a) Yes
b) Maybe yes
c) No
d) Maybe No
Q4. What are the benefits that Marks and Spencer can get of adopting an updated data security
system ?
a) Reduction into risks related to information breaks
b) Less number of digital assaults
c) Reduction within the overall cyber crimes
Q5. How Marks and Spencer could effectively build up customer's trust ?
a) Through utilising an effective data security system.
b) Through offering customers with the quality products and services
c) Through adopting updated technology
Q6. Based on your own thinking, what are the challenges Marks and Spencer could face wile
adopting data security systems ?
a) High investments
b) Requirement of skilled staff
c) Permission from higher authorities
Q7. What are the best data security systems, that can be adopted by Marks and Spencer to build
trust of consumers among targeted areas ?
a) SiteLock
b) Heimdal CORP
c) WebTitan – DNS
Q8. What are the alterations that M&S can effectively make in relation to data security
systems ?
a) Add a web application firewall and real-time backups
12
b) Maybe
c) No
Q3. Are existing data security systems used by Marks and Spencer can reduce the digital
assaults ?
a) Yes
b) Maybe yes
c) No
d) Maybe No
Q4. What are the benefits that Marks and Spencer can get of adopting an updated data security
system ?
a) Reduction into risks related to information breaks
b) Less number of digital assaults
c) Reduction within the overall cyber crimes
Q5. How Marks and Spencer could effectively build up customer's trust ?
a) Through utilising an effective data security system.
b) Through offering customers with the quality products and services
c) Through adopting updated technology
Q6. Based on your own thinking, what are the challenges Marks and Spencer could face wile
adopting data security systems ?
a) High investments
b) Requirement of skilled staff
c) Permission from higher authorities
Q7. What are the best data security systems, that can be adopted by Marks and Spencer to build
trust of consumers among targeted areas ?
a) SiteLock
b) Heimdal CORP
c) WebTitan – DNS
Q8. What are the alterations that M&S can effectively make in relation to data security
systems ?
a) Add a web application firewall and real-time backups
12
b) Have a two-step verification process
c) Encrypt everything
Q9. Do you think if, Marks and Spencer should keep on working with the existing cyber
security systems adopted this organisation ?
a) Yes
b) May be
c) No
Q10. What are the security measures, that can be adopted by Marks and Spencer to build trust
of customers effectively ?
a) Intrusion-detection systems
b) Patching and updating
c) Port scanners
Q11. Any recommendations ?
DATA ANALYSIS
In every single investigation, this section is required because data that has been collected
requires proper analysis so that desired goals and objectives can easily be obtained right on time.
Data analysis is defined as a process of cleaning, transforming, and modelling data to discover
useful information for business decision-making (Patil, 2016). The purpose of Data Analysis is
to extract useful information from data and taking the decision based upon the data analysis.
Based on the topic that has been taken into consideration that is “To analyse the importance of
implementing data security aspects while managing procedures to reduce risks of digital assaults
to improve customer trust in relation to products and services offered by Marks and Spencer.”, a
frequency table has been prepared for collecting the data from selected respondents.
FREQUENCY TABLE
Q1. Do you have any knowledge related to why it is important for a
company to develop data security related measures ?
Frequency
a) Yes 30
b) No 10
13
c) Encrypt everything
Q9. Do you think if, Marks and Spencer should keep on working with the existing cyber
security systems adopted this organisation ?
a) Yes
b) May be
c) No
Q10. What are the security measures, that can be adopted by Marks and Spencer to build trust
of customers effectively ?
a) Intrusion-detection systems
b) Patching and updating
c) Port scanners
Q11. Any recommendations ?
DATA ANALYSIS
In every single investigation, this section is required because data that has been collected
requires proper analysis so that desired goals and objectives can easily be obtained right on time.
Data analysis is defined as a process of cleaning, transforming, and modelling data to discover
useful information for business decision-making (Patil, 2016). The purpose of Data Analysis is
to extract useful information from data and taking the decision based upon the data analysis.
Based on the topic that has been taken into consideration that is “To analyse the importance of
implementing data security aspects while managing procedures to reduce risks of digital assaults
to improve customer trust in relation to products and services offered by Marks and Spencer.”, a
frequency table has been prepared for collecting the data from selected respondents.
FREQUENCY TABLE
Q1. Do you have any knowledge related to why it is important for a
company to develop data security related measures ?
Frequency
a) Yes 30
b) No 10
13
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Q2. As per your own point of view, do you think if customer's trust plays
a crucial role for a business company ?
Frequency
a) Yes 20
b) Maybe 15
c) No 5
Q3. Are existing data security systems used by Marks and Spencer can
reduce the digital assaults ?
Frequency
a) Yes 20
b) Maybe yes 16
c) No 3
d) Maybe No 1
Q4. What are the benefits that Marks and Spencer can get of adopting an
updated data security system ?
Frequency
a) Reduction into risks related to information breaks 10
b) Less number of digital assaults 16
c) Reduction within the overall cyber crimes 14
Q5. How Marks and Spencer could effectively build up customer's
trust ?
Frequency
a) Through utilising an effective data security system. 14
b) Through offering customers with the quality products and services 16
c) Through adopting updated technology 10
Q6. Based on your own thinking, what are the challenges Marks and
Spencer could face wile adopting data security systems ?
Frequency
a) High investments 15
b) Requirement of skilled staff 15
c) Permission from higher authorities 10
14
a crucial role for a business company ?
Frequency
a) Yes 20
b) Maybe 15
c) No 5
Q3. Are existing data security systems used by Marks and Spencer can
reduce the digital assaults ?
Frequency
a) Yes 20
b) Maybe yes 16
c) No 3
d) Maybe No 1
Q4. What are the benefits that Marks and Spencer can get of adopting an
updated data security system ?
Frequency
a) Reduction into risks related to information breaks 10
b) Less number of digital assaults 16
c) Reduction within the overall cyber crimes 14
Q5. How Marks and Spencer could effectively build up customer's
trust ?
Frequency
a) Through utilising an effective data security system. 14
b) Through offering customers with the quality products and services 16
c) Through adopting updated technology 10
Q6. Based on your own thinking, what are the challenges Marks and
Spencer could face wile adopting data security systems ?
Frequency
a) High investments 15
b) Requirement of skilled staff 15
c) Permission from higher authorities 10
14
Q7. What are the best data security systems, that can be adopted by
Marks and Spencer to build trust of consumers among targeted areas ?
Frequency
a) SiteLock 10
b) Heimdal CORP 15
c) WebTitan – DNS 15
Q8. What are the alterations that M&S can effectively make in relation
to data security systems ?
Frequency
a) Add a web application firewall and real-time backups 16
b) Have a two-step verification process 14
c) Encrypt everything 10
Q9. Do you think if, Marks and Spencer should keep on working with the
existing cyber security systems adopted this organisation ?
Frequency
a) Yes 20
b) May be 15
c) No 5
Q10. What are the security measures, that can be adopted by Marks and
Spencer to build trust of customers effectively ?
Frequency
a) Intrusion-detection systems 18
b) Patching and updating 12
c) Port scanners 10
15
Marks and Spencer to build trust of consumers among targeted areas ?
Frequency
a) SiteLock 10
b) Heimdal CORP 15
c) WebTitan – DNS 15
Q8. What are the alterations that M&S can effectively make in relation
to data security systems ?
Frequency
a) Add a web application firewall and real-time backups 16
b) Have a two-step verification process 14
c) Encrypt everything 10
Q9. Do you think if, Marks and Spencer should keep on working with the
existing cyber security systems adopted this organisation ?
Frequency
a) Yes 20
b) May be 15
c) No 5
Q10. What are the security measures, that can be adopted by Marks and
Spencer to build trust of customers effectively ?
Frequency
a) Intrusion-detection systems 18
b) Patching and updating 12
c) Port scanners 10
15
THEMATIC ANALYSIS
THEME 1: Importance for a company to develop data security related measures
Q1. Do you have any knowledge related to why it is important for a company
to develop data security related measures ?
Frequency
a) Yes 30
b) No 10
a) Yes b) No
0
5
10
15
20
25
30
30
10
Chart Title
Interpretation: Considering the above graph, it is interpreted that 40 out of 30
respondents consist of knowledge in relation to the company that they should develop data
securities in order to improve the customer satisfaction level and secured from various cyber
attacks and so on.Including this, only 40 out of 10 respondents has mentioned that they do not
have any information related to to developing a data security system and also they don't know
about their importance. Away with this, they have also mentioned about it is not necessarily
important for a company to develop security systems because there are not a lot of cases that
usually happens within a company in relation to digital assaults.
THEME 2: Customer's trust plays a crucial role for a business company
Q2. As per your own point of view, do you think if customer's trust plays a
crucial role for a business company ?
Frequency
a) Yes 20
b) Maybe 15
16
THEME 1: Importance for a company to develop data security related measures
Q1. Do you have any knowledge related to why it is important for a company
to develop data security related measures ?
Frequency
a) Yes 30
b) No 10
a) Yes b) No
0
5
10
15
20
25
30
30
10
Chart Title
Interpretation: Considering the above graph, it is interpreted that 40 out of 30
respondents consist of knowledge in relation to the company that they should develop data
securities in order to improve the customer satisfaction level and secured from various cyber
attacks and so on.Including this, only 40 out of 10 respondents has mentioned that they do not
have any information related to to developing a data security system and also they don't know
about their importance. Away with this, they have also mentioned about it is not necessarily
important for a company to develop security systems because there are not a lot of cases that
usually happens within a company in relation to digital assaults.
THEME 2: Customer's trust plays a crucial role for a business company
Q2. As per your own point of view, do you think if customer's trust plays a
crucial role for a business company ?
Frequency
a) Yes 20
b) Maybe 15
16
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
c) No 5
a) Yes b) Maybe c) No
0
2
4
6
8
10
12
14
16
18
20
20
15
5
Chart Title
Interpretation:Considering or by looking at the above mentioned graph, it is pretty much
clear that customers trust playsan effective role for every single business organisation because
without customer trust a company cannot sustain within the market for a longer period of time
and the reason is there will not purchase products and services that are being offered by them. On
the other hand, table has showed that out of 40 respondents only 20 has mentioned that yes
customers are important for a business organisation and their trust as well. Along with this, 15
respondents were not sure about anything that it is possible that customers trust may play an
important role or not. Lastly, only five respondents from total number of 40 in the favour of
giving decisions towards no and stated that customers trust do not effect a company in any way.
THEME 3: Existing data security systems used by Marks and Spencer can reduce the
digital assaults
Q3. Are existing data security systems used by Marks and Spencer can reduce
the digital assaults ?
Frequency
a) Yes 20
b) Maybe yes 16
c) No 3
17
a) Yes b) Maybe c) No
0
2
4
6
8
10
12
14
16
18
20
20
15
5
Chart Title
Interpretation:Considering or by looking at the above mentioned graph, it is pretty much
clear that customers trust playsan effective role for every single business organisation because
without customer trust a company cannot sustain within the market for a longer period of time
and the reason is there will not purchase products and services that are being offered by them. On
the other hand, table has showed that out of 40 respondents only 20 has mentioned that yes
customers are important for a business organisation and their trust as well. Along with this, 15
respondents were not sure about anything that it is possible that customers trust may play an
important role or not. Lastly, only five respondents from total number of 40 in the favour of
giving decisions towards no and stated that customers trust do not effect a company in any way.
THEME 3: Existing data security systems used by Marks and Spencer can reduce the
digital assaults
Q3. Are existing data security systems used by Marks and Spencer can reduce
the digital assaults ?
Frequency
a) Yes 20
b) Maybe yes 16
c) No 3
17
d) Maybe No 1
a) Yes b) Maybe yes c) No d) Maybe No
0
2
4
6
8
10
12
14
16
18
20
20
16
3 1
Chart Title
Interpretation:Based on the information given within above graph, it can easily be said
that 40 out of 20 respondents mention that the existing data system all the security system that
has been adopted by Marks and Spencer is much effective in nature and can be considered as
something which may reduce the number of digital assaults that may take place in near future.
On the other hand, only 16 respondents for in the favour of maybe as and stated that the digital
security system that Marks and Spencer is using may help this organisation in reducing the
digital assault related cases. Including this, rest of the four respondents were in favour of no and
maybe no and considered the existing data security system that has been taken into consideration
by Marks and Spencer could not help this company in in in removing the risk of data security.
THEME 4: Benefits that Marks and Spencer can get of adopting an updated data security
system
Q4. What are the benefits that Marks and Spencer can get of adopting an
updated data security system ?
Frequency
a) Reduction into risks related to information breaks 10
b) Less number of digital assaults 16
c) Reduction within the overall cyber crimes 14
18
a) Yes b) Maybe yes c) No d) Maybe No
0
2
4
6
8
10
12
14
16
18
20
20
16
3 1
Chart Title
Interpretation:Based on the information given within above graph, it can easily be said
that 40 out of 20 respondents mention that the existing data system all the security system that
has been adopted by Marks and Spencer is much effective in nature and can be considered as
something which may reduce the number of digital assaults that may take place in near future.
On the other hand, only 16 respondents for in the favour of maybe as and stated that the digital
security system that Marks and Spencer is using may help this organisation in reducing the
digital assault related cases. Including this, rest of the four respondents were in favour of no and
maybe no and considered the existing data security system that has been taken into consideration
by Marks and Spencer could not help this company in in in removing the risk of data security.
THEME 4: Benefits that Marks and Spencer can get of adopting an updated data security
system
Q4. What are the benefits that Marks and Spencer can get of adopting an
updated data security system ?
Frequency
a) Reduction into risks related to information breaks 10
b) Less number of digital assaults 16
c) Reduction within the overall cyber crimes 14
18
a) Reduction into risks
related to information
breaks
b) Less number of digital
assaults c) Reduction within the
overall cyber crimes
0
2
4
6
8
10
12
14
16
10
16 14
Chart Title
Interpretation:Graph has clearly show that 40 out of 10 respondents were in favour of
reduction in tourist related to information breaks that Marks and Spencer can get from adopting a
whole new data security system for themselves. On the other hand, 16 from the number of 40
respondents has clearly show that lesson number of digital assaults main take place within the
company and it will also improve eyes the security related to personal information of the
customers and will improve their proficiency level as well. Away with this, only 14 respondents
were in the favour of reduction within the overall cybercrimes that Marks and Spencer can do
through adopting a updated data security system and it will also enhance the customer loyalty
and customer trust towards the products and services offered by them.
THEME 5: Marks and Spencer could effectively build up customer's trust
Q5. How Marks and Spencer could effectively build up customer's trust ? Frequency
a) Through utilising an effective data security system. 14
b) Through offering customers with the quality products and services 16
c) Through adopting updated technology 10
19
related to information
breaks
b) Less number of digital
assaults c) Reduction within the
overall cyber crimes
0
2
4
6
8
10
12
14
16
10
16 14
Chart Title
Interpretation:Graph has clearly show that 40 out of 10 respondents were in favour of
reduction in tourist related to information breaks that Marks and Spencer can get from adopting a
whole new data security system for themselves. On the other hand, 16 from the number of 40
respondents has clearly show that lesson number of digital assaults main take place within the
company and it will also improve eyes the security related to personal information of the
customers and will improve their proficiency level as well. Away with this, only 14 respondents
were in the favour of reduction within the overall cybercrimes that Marks and Spencer can do
through adopting a updated data security system and it will also enhance the customer loyalty
and customer trust towards the products and services offered by them.
THEME 5: Marks and Spencer could effectively build up customer's trust
Q5. How Marks and Spencer could effectively build up customer's trust ? Frequency
a) Through utilising an effective data security system. 14
b) Through offering customers with the quality products and services 16
c) Through adopting updated technology 10
19
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
a) Through utilising an
effective data security
system.
b) Through offering
customers with the
quality products and
services
c) Through adopting
updated technology
0
2
4
6
8
10
12
14
16
14 16
10
Chart Title
Interpretation:Based on the above graph, it is pretty much clear that 14 respondents from
the total number of 40 were in the favour of utilisation of effective data security system as it will
help Marks and Spencer in enhancing the customers trust. Away with this, 16 from the 40
respondents has given their answers to words true offering quality services along with the
procedures to the customers will help from in enhancing the customers trust. Lastly, only 10
from 40 respondents has given their II answers in relation to you updating all the technologies
that has already been adopted by the company as it will help from in building both the trust and
loyalty of.
THEME 6: The challenges Marks and Spencer could face wile adopting data security
systems
Q6. Based on your own thinking, what are the challenges Marks and Spencer
could face wile adopting data security systems ?
Frequency
a) High investments 15
b) Requirement of skilled staff 15
c) Permission from higher authorities 10
20
effective data security
system.
b) Through offering
customers with the
quality products and
services
c) Through adopting
updated technology
0
2
4
6
8
10
12
14
16
14 16
10
Chart Title
Interpretation:Based on the above graph, it is pretty much clear that 14 respondents from
the total number of 40 were in the favour of utilisation of effective data security system as it will
help Marks and Spencer in enhancing the customers trust. Away with this, 16 from the 40
respondents has given their answers to words true offering quality services along with the
procedures to the customers will help from in enhancing the customers trust. Lastly, only 10
from 40 respondents has given their II answers in relation to you updating all the technologies
that has already been adopted by the company as it will help from in building both the trust and
loyalty of.
THEME 6: The challenges Marks and Spencer could face wile adopting data security
systems
Q6. Based on your own thinking, what are the challenges Marks and Spencer
could face wile adopting data security systems ?
Frequency
a) High investments 15
b) Requirement of skilled staff 15
c) Permission from higher authorities 10
20
a) High investments b) Requirement of skilled
staff c) Permission from
higher authorities
0
2
4
6
8
10
12
14
16
15 15
10
Chart Title
Interpretation:with the help of graph, it is is interpreted that out of 40 respondents only
15 has given their answers that while adopting a data security system a whole new one, company
might get into the foremost challenge that is high investment. Including this, 40 out of 15 has
clearly show their answers towards company would require to develop recruit staff members that
are skilled in nature. Also, Marks and Spencer would required to get permission from higher
authorities as around 10 respondent has given their answers towards this point.
THEME 7: Best data security systems, that can be adopted by Marks and Spencer to build
trust of consumers among targeted areas
Q7. What are the best data security systems, that can be adopted by Marks
and Spencer to build trust of consumers among targeted areas ?
Frequency
a) SiteLock 10
b) Heimdal CORP 15
c) WebTitan – DNS 15
21
staff c) Permission from
higher authorities
0
2
4
6
8
10
12
14
16
15 15
10
Chart Title
Interpretation:with the help of graph, it is is interpreted that out of 40 respondents only
15 has given their answers that while adopting a data security system a whole new one, company
might get into the foremost challenge that is high investment. Including this, 40 out of 15 has
clearly show their answers towards company would require to develop recruit staff members that
are skilled in nature. Also, Marks and Spencer would required to get permission from higher
authorities as around 10 respondent has given their answers towards this point.
THEME 7: Best data security systems, that can be adopted by Marks and Spencer to build
trust of consumers among targeted areas
Q7. What are the best data security systems, that can be adopted by Marks
and Spencer to build trust of consumers among targeted areas ?
Frequency
a) SiteLock 10
b) Heimdal CORP 15
c) WebTitan – DNS 15
21
a) SiteLock b) Heimdal CORP c) WebTitan – DNS
0
2
4
6
8
10
12
14
16
10
15 15
Chart Title
Interpretation:if it is talked about the above graph, it is pretty much clear that the best
data security system that Marks and Spencer can adopt is WebTitan–DNS or Heimdal CORP.
Basically, 15 respondents from the total number of 40 were in the favour of WebTitan – DNS.
Including this, 40 out of 10 respondents has given their answers towardsHeimdal CORP and
mentioned that both of these security systems in relation to data can help the organisation in in
enhancing the customer loyalty and the trust as well in a much effective and efficient manner.
Only 10 respondents has stated that SiteLock, can be considered as one of the crucial updated
security system that may lead Marks and Spencer to gain competitive advantages through
enhancing the customers trust towards the information that they have given.
THEME 8: Alterations that M&S can effectively make in relation to data security systems
Q8. What are the alterations that M&S can effectively make in relation to
data security systems ?
Frequency
a) Add a web application firewall and real-time backups 16
b) Have a two-step verification process 14
c) Encrypt everything 10
22
0
2
4
6
8
10
12
14
16
10
15 15
Chart Title
Interpretation:if it is talked about the above graph, it is pretty much clear that the best
data security system that Marks and Spencer can adopt is WebTitan–DNS or Heimdal CORP.
Basically, 15 respondents from the total number of 40 were in the favour of WebTitan – DNS.
Including this, 40 out of 10 respondents has given their answers towardsHeimdal CORP and
mentioned that both of these security systems in relation to data can help the organisation in in
enhancing the customer loyalty and the trust as well in a much effective and efficient manner.
Only 10 respondents has stated that SiteLock, can be considered as one of the crucial updated
security system that may lead Marks and Spencer to gain competitive advantages through
enhancing the customers trust towards the information that they have given.
THEME 8: Alterations that M&S can effectively make in relation to data security systems
Q8. What are the alterations that M&S can effectively make in relation to
data security systems ?
Frequency
a) Add a web application firewall and real-time backups 16
b) Have a two-step verification process 14
c) Encrypt everything 10
22
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
a) Add a web application
firewall and real-time
backups
b) Have a two-step
verification process c) Encrypt everything
0
2
4
6
8
10
12
14
16
16 14
10
Chart Title
Interpretation: Above graph has clearly showed that, Marks and Spencer can effectively
develop alterations through adding a web application firewall, real time backup and so on as
information that has been given by 16 respondents from the total number of 40. Including this,
10 respondents has showed that company would required to encrypt everything in order to to
enhance the security system in relation to data. Along with this, 40 out of 14 respondents we are
in the favour of developing a two step verification process within the data security system that
may lead the company to enhance the customers trust.
THEME 9: Marks and Spencer should keep on working with the existing cyber security
systems adopted this organisation
Q9. Do you think if, Marks and Spencer should keep on working with the
existing cyber security systems adopted by this organisation ?
Frequency
a) Yes 20
b) May be 15
c) No 5
23
firewall and real-time
backups
b) Have a two-step
verification process c) Encrypt everything
0
2
4
6
8
10
12
14
16
16 14
10
Chart Title
Interpretation: Above graph has clearly showed that, Marks and Spencer can effectively
develop alterations through adding a web application firewall, real time backup and so on as
information that has been given by 16 respondents from the total number of 40. Including this,
10 respondents has showed that company would required to encrypt everything in order to to
enhance the security system in relation to data. Along with this, 40 out of 14 respondents we are
in the favour of developing a two step verification process within the data security system that
may lead the company to enhance the customers trust.
THEME 9: Marks and Spencer should keep on working with the existing cyber security
systems adopted this organisation
Q9. Do you think if, Marks and Spencer should keep on working with the
existing cyber security systems adopted by this organisation ?
Frequency
a) Yes 20
b) May be 15
c) No 5
23
a) Yes b) May be c) No
0
2
4
6
8
10
12
14
16
18
20
20
15
5
Chart Title
Interpretation:graph, showed that only 20 out of 40 respondents were in favour of Marks
and Spencer should continue with the existing cyber security system that has been adopted by
them. Also, 40 out of 15 has given their information in relation to maybe that the company
should or shouldn’t adopt a whole new cyber security system for their customers. Lastly, 40 out
of 5 respondents has showed their answers towards no and stated that company would required
to adopt a whole new security system for their own betterment and for reducing the risk of
leaking personal information of their customers.
THEME 10: Security measures, that can be adopted by Marks and Spencer to build trust
of customers effectively
Q10. What are the security measures, that can be adopted by Marks and
Spencer to build trust of customers effectively ?
Frequency
a) Intrusion-detection systems 18
b) Patching and updating 12
c) Port scanners 10
24
0
2
4
6
8
10
12
14
16
18
20
20
15
5
Chart Title
Interpretation:graph, showed that only 20 out of 40 respondents were in favour of Marks
and Spencer should continue with the existing cyber security system that has been adopted by
them. Also, 40 out of 15 has given their information in relation to maybe that the company
should or shouldn’t adopt a whole new cyber security system for their customers. Lastly, 40 out
of 5 respondents has showed their answers towards no and stated that company would required
to adopt a whole new security system for their own betterment and for reducing the risk of
leaking personal information of their customers.
THEME 10: Security measures, that can be adopted by Marks and Spencer to build trust
of customers effectively
Q10. What are the security measures, that can be adopted by Marks and
Spencer to build trust of customers effectively ?
Frequency
a) Intrusion-detection systems 18
b) Patching and updating 12
c) Port scanners 10
24
a) Intrusion-detection
systems b) Patching and updating c) Port scanners
0
2
4
6
8
10
12
14
16
18
18
12 10
Chart Title
Interpretation:Graph has given the interpretations where 40 out of 18 respondents were
in the favour of intrusion detection system which may help company e in enhancing their
customers trust. On the other hand, patching and updating is another source that can be adopted
by Marks and Spencer in relation to enhancing the security measures so that customers trust can
easily be built. Lastly, only 10 were in the favour of Port scanners.
CONCLUSION
REFLECTION
While performing the investigation on the above topic, I have had gone through various
challenges which made me confuse and impacted on myoverall performance level.This is where,
I took help up of my colleagues and my tutor as well who has showed various ways through
which I can reduce the risk that was linked to finish the project with right information and in
correct time.According to my own perception, I have also been perceiving that right now has
been applied by the specialist as to gathering of data from the examination of the viewpoint of
various writers and scholars. As per the point by point examination of the undertaking I have
additionally been perceive that inductive methodology has been utilized as it is viable in giving
appropriate results through investigation of speculations and theory. In the current examination
work both essential just as optional apparatuses are utilized by the scientist as essential
instrument Is compelling in execution of study with the assistance of setting up a survey as right
now recorded by the respondents who are having noteworthy thought and information in regards
to the similitude of work.
25
systems b) Patching and updating c) Port scanners
0
2
4
6
8
10
12
14
16
18
18
12 10
Chart Title
Interpretation:Graph has given the interpretations where 40 out of 18 respondents were
in the favour of intrusion detection system which may help company e in enhancing their
customers trust. On the other hand, patching and updating is another source that can be adopted
by Marks and Spencer in relation to enhancing the security measures so that customers trust can
easily be built. Lastly, only 10 were in the favour of Port scanners.
CONCLUSION
REFLECTION
While performing the investigation on the above topic, I have had gone through various
challenges which made me confuse and impacted on myoverall performance level.This is where,
I took help up of my colleagues and my tutor as well who has showed various ways through
which I can reduce the risk that was linked to finish the project with right information and in
correct time.According to my own perception, I have also been perceiving that right now has
been applied by the specialist as to gathering of data from the examination of the viewpoint of
various writers and scholars. As per the point by point examination of the undertaking I have
additionally been perceive that inductive methodology has been utilized as it is viable in giving
appropriate results through investigation of speculations and theory. In the current examination
work both essential just as optional apparatuses are utilized by the scientist as essential
instrument Is compelling in execution of study with the assistance of setting up a survey as right
now recorded by the respondents who are having noteworthy thought and information in regards
to the similitude of work.
25
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Recommendations
Based on the above-mentioned information, it is recommended that Marks and Spencer would
require to bring some changes within the existing data security system. It is viable because,
considering WebTitan – DNS, this company would easily gain competitive advantages and build
the trust of customers from all over the world. Also, it is recommended to the business
organisation that it will required to develop two side verification system so that security could
effectively be built double which will directly reduce the digital assaults and danger of
information leak of potential customers.
Conclusion
With the help of above-mentioned report, it is concluded that a company would require to bring
modifications within h data security system again and again so that no issues like risk of data
salting or danger of leaking information of consumers could take place. Appropriate
modifications will effectively lead company to gain trust of the customers and it will also help in
in gaining competitive advantages as well. Also, developing different range of campaigns in
relation to personal information like customers would require to change the passwords of the
different applications that they are using would lead Marks and Spencer or any other business
organisation to enhance the security system where risk of leaking personal information may
reduce to minimal.
26
Based on the above-mentioned information, it is recommended that Marks and Spencer would
require to bring some changes within the existing data security system. It is viable because,
considering WebTitan – DNS, this company would easily gain competitive advantages and build
the trust of customers from all over the world. Also, it is recommended to the business
organisation that it will required to develop two side verification system so that security could
effectively be built double which will directly reduce the digital assaults and danger of
information leak of potential customers.
Conclusion
With the help of above-mentioned report, it is concluded that a company would require to bring
modifications within h data security system again and again so that no issues like risk of data
salting or danger of leaking information of consumers could take place. Appropriate
modifications will effectively lead company to gain trust of the customers and it will also help in
in gaining competitive advantages as well. Also, developing different range of campaigns in
relation to personal information like customers would require to change the passwords of the
different applications that they are using would lead Marks and Spencer or any other business
organisation to enhance the security system where risk of leaking personal information may
reduce to minimal.
26
REFERENCES
Books and Journals
Alamsyah, D.P., Trijumansyah, A. and Hariyanto, O.I., 2017. Mediating of Store Image on
Customer Trust for Organic Vegetables. Mimbar: Jurnal Sosial dan
Pembangunan. 33(1). pp.132-141.
Barnes, C., 2016. Omni-channel retail—challenges and opportunities for packaging innovation.
In Integrating the Packaging and Product Experience in Food and Beverages (pp. 59-
76). Woodhead Publishing.
Castaldo, S and et. al., 2016. The missing path to gain customers loyalty in pharmacy retail: The
role of the store in developing satisfaction and trust. Research in Social and
Administrative Pharmacy. 12(5). pp.699-712.
Chou, Y.C., Chuang, H.H.C. and Shao, B.B., 2016. The impact of e-retail characteristics on
initiating mobile retail services: A modular innovation perspective. Information &
Management. 53(4). pp.481-492.
Dabija, D.C. and Bejan, B., 2017, July. Behavioral antecedents for enhancing green customer
loyalty in retail. In BASIQ international conference: New trends in sustainable business
and consumption (Vol. 1, pp. 183-191).
Dlamini, N.N. and Johnston, K., 2016, November. The use, benefits and challenges of using the
Internet of Things (IoT) in retail businesses: A literature review. In 2016 International
Conference on Advances in Computing and Communication Engineering (ICACCE) (pp.
430-436). IEEE.
Duarte, P., e Silva, S.C. and Ferreira, M.B., 2018. How convenient is it? Delivering online
shopping convenience to enhance customer satisfaction and encourage e-WOM. Journal
of Retailing and Consumer Services. 44. pp.161-169.
Dutta, S., Chauhan, R.K. and Chauhan, K., 2017. The impact of electronic service quality's
dimensions on customer trust for online travel agencies in India. Turizam. 21(3). pp.111-
122.
Farshidi, A., 2016. The new retail experience and its unaddressed privacy concerns: how RFID
and mobile location analytics are collecting customer information. Case W. Res. JL Tech.
& Internet, 7, p.15.
Fernando, Y., Chidambaram, R.R. and Wahyuni-TD, I.S., 2018. The impact of Big Data
analytics and data security practices on service supply chain
performance. Benchmarking: An International Journal.
Garaus, M. and Wagner, U., 2016. Retail shopper confusion: Conceptualization, scale
development, and consequences. Journal of Business Research. 69(9). pp.3459-3467.
Goldfeder, S and et. al, 2017, April. Escrow protocols for cryptocurrencies: How to buy physical
goods using bitcoin. In International Conference on Financial Cryptography and Data
Security. (pp. 321-339). Springer, Cham.
Hamidi, H. and Moradi, S., 2017. Analysis of consideration of security parameters by vendors on
trust and customer satisfaction in e-commerce. Journal of Global Information
Management (JGIM). 25(4). pp.32-45.
Iglesias, O and et. al., 2018. Co-creation: A key link between corporate social responsibility,
customer trust, and customer loyalty. Journal of Business Ethics. pp.1-16.
27
Books and Journals
Alamsyah, D.P., Trijumansyah, A. and Hariyanto, O.I., 2017. Mediating of Store Image on
Customer Trust for Organic Vegetables. Mimbar: Jurnal Sosial dan
Pembangunan. 33(1). pp.132-141.
Barnes, C., 2016. Omni-channel retail—challenges and opportunities for packaging innovation.
In Integrating the Packaging and Product Experience in Food and Beverages (pp. 59-
76). Woodhead Publishing.
Castaldo, S and et. al., 2016. The missing path to gain customers loyalty in pharmacy retail: The
role of the store in developing satisfaction and trust. Research in Social and
Administrative Pharmacy. 12(5). pp.699-712.
Chou, Y.C., Chuang, H.H.C. and Shao, B.B., 2016. The impact of e-retail characteristics on
initiating mobile retail services: A modular innovation perspective. Information &
Management. 53(4). pp.481-492.
Dabija, D.C. and Bejan, B., 2017, July. Behavioral antecedents for enhancing green customer
loyalty in retail. In BASIQ international conference: New trends in sustainable business
and consumption (Vol. 1, pp. 183-191).
Dlamini, N.N. and Johnston, K., 2016, November. The use, benefits and challenges of using the
Internet of Things (IoT) in retail businesses: A literature review. In 2016 International
Conference on Advances in Computing and Communication Engineering (ICACCE) (pp.
430-436). IEEE.
Duarte, P., e Silva, S.C. and Ferreira, M.B., 2018. How convenient is it? Delivering online
shopping convenience to enhance customer satisfaction and encourage e-WOM. Journal
of Retailing and Consumer Services. 44. pp.161-169.
Dutta, S., Chauhan, R.K. and Chauhan, K., 2017. The impact of electronic service quality's
dimensions on customer trust for online travel agencies in India. Turizam. 21(3). pp.111-
122.
Farshidi, A., 2016. The new retail experience and its unaddressed privacy concerns: how RFID
and mobile location analytics are collecting customer information. Case W. Res. JL Tech.
& Internet, 7, p.15.
Fernando, Y., Chidambaram, R.R. and Wahyuni-TD, I.S., 2018. The impact of Big Data
analytics and data security practices on service supply chain
performance. Benchmarking: An International Journal.
Garaus, M. and Wagner, U., 2016. Retail shopper confusion: Conceptualization, scale
development, and consequences. Journal of Business Research. 69(9). pp.3459-3467.
Goldfeder, S and et. al, 2017, April. Escrow protocols for cryptocurrencies: How to buy physical
goods using bitcoin. In International Conference on Financial Cryptography and Data
Security. (pp. 321-339). Springer, Cham.
Hamidi, H. and Moradi, S., 2017. Analysis of consideration of security parameters by vendors on
trust and customer satisfaction in e-commerce. Journal of Global Information
Management (JGIM). 25(4). pp.32-45.
Iglesias, O and et. al., 2018. Co-creation: A key link between corporate social responsibility,
customer trust, and customer loyalty. Journal of Business Ethics. pp.1-16.
27
Jayapandian, N and et. al., 2017, March. To enhance consumer privacy and security for online
shopping using MD5 algorithm. In 2017 International Conference on Innovations in
Information, Embedded and Communication Systems (ICIIECS) (pp. 1-4). IEEE.
Joshi, N. and Kadhiwala, B., 2017, April. Big data security and privacy issues—A survey.
In 2017 Innovations in Power and Advanced Computing Technologies (i-PACT) (pp. 1-
5). IEEE.
Khan, W.Zand et. al., 2016. Enabling consumer trust upon acceptance of IoT technologies
through security and privacy model. In Advanced multimedia and ubiquitous
engineering. (pp. 111-117). Springer, Singapore.
Kourid, A. and Chikhi, S., 2018. A Comparative Study of Recent Advances in Big Data for
Security and Privacy. In Networking Communication and Data Knowledge
Engineering (pp. 249-259). Springer, Singapore.
Mylrea, M. and Gourisetti, S.N.G., 2017, September. Blockchain for smart grid resilience:
Exchanging distributed energy at speed, scale and security. In 2017 Resilience Week
(RWS). (pp. 18-23). IEEE.
Patil, K., 2016, December. Retail adoption of Internet of Things: Applying TAM model. In 2016
International Conference on Computing, Analytics and Security Trends (CAST) (pp. 404-
409). IEEE.
Raipurkar, K.V. and Deorankar, A.V., 2016, March. Improve data security in cloud environment
by using LDAP and two way encryption algorithm. In 2016 Symposium on Colossal Data
Analysis and Networking (CDAN) (pp. 1-4). IEEE.
Ramanathan, U., Subramanian, N. and Parrott, G., 2017. Role of social media in retail network
operations and marketing to enhance customer satisfaction. International Journal of
Operations & Production Management.
Singh, S., Jeong, Y.S. and Park, J.H., 2016. A survey on cloud computing security: Issues,
threats, and solutions. Journal of Network and Computer Applications. 75. pp.200-222.
Suki, N.M. and Suki, N.M., 2017. Modeling the determinants of consumers' attitudes toward
online group buying: Do risks and trusts matters?. Journal of Retailing and Consumer
Services. 36. pp.180-188.
Taylor, E., 2016. Mobile payment technologies in retail: a review of potential benefits and
risks. International Journal of Retail & Distribution Management.
Tian, F., 2017, June. A supply chain traceability system for food safety based on HACCP,
blockchain & Internet of things. In 2017 International conference on service systems and
service management (pp. 1-6). IEEE.
Toufaily, E. and Pons, F., 2017. Impact of customers' assessment of website attributes on e-
relationship in the securities brokerage industry: A multichannel perspective. Journal of
Retailing and Consumer Services. 34. pp.58-69.
ur Rehman, M.H aqnd et. al., 2016. Big data reduction framework for value creation in
sustainable enterprises. International Journal of Information Management. 36(6). pp.917-
928.
Varghese, J. and Sudhahar, J.C., 2018. An analysis on the impact on customer trust in the digital
era with special reference to age group. SMART Journal of Business Management
Studies. 14(2), pp.33-39.
Wollenburg, J and et. al., 2018. Configuring retail fulfillment processes for omni-channel
customer steering. International Journal of Electronic Commerce. 22(4). pp.540-575.
28
shopping using MD5 algorithm. In 2017 International Conference on Innovations in
Information, Embedded and Communication Systems (ICIIECS) (pp. 1-4). IEEE.
Joshi, N. and Kadhiwala, B., 2017, April. Big data security and privacy issues—A survey.
In 2017 Innovations in Power and Advanced Computing Technologies (i-PACT) (pp. 1-
5). IEEE.
Khan, W.Zand et. al., 2016. Enabling consumer trust upon acceptance of IoT technologies
through security and privacy model. In Advanced multimedia and ubiquitous
engineering. (pp. 111-117). Springer, Singapore.
Kourid, A. and Chikhi, S., 2018. A Comparative Study of Recent Advances in Big Data for
Security and Privacy. In Networking Communication and Data Knowledge
Engineering (pp. 249-259). Springer, Singapore.
Mylrea, M. and Gourisetti, S.N.G., 2017, September. Blockchain for smart grid resilience:
Exchanging distributed energy at speed, scale and security. In 2017 Resilience Week
(RWS). (pp. 18-23). IEEE.
Patil, K., 2016, December. Retail adoption of Internet of Things: Applying TAM model. In 2016
International Conference on Computing, Analytics and Security Trends (CAST) (pp. 404-
409). IEEE.
Raipurkar, K.V. and Deorankar, A.V., 2016, March. Improve data security in cloud environment
by using LDAP and two way encryption algorithm. In 2016 Symposium on Colossal Data
Analysis and Networking (CDAN) (pp. 1-4). IEEE.
Ramanathan, U., Subramanian, N. and Parrott, G., 2017. Role of social media in retail network
operations and marketing to enhance customer satisfaction. International Journal of
Operations & Production Management.
Singh, S., Jeong, Y.S. and Park, J.H., 2016. A survey on cloud computing security: Issues,
threats, and solutions. Journal of Network and Computer Applications. 75. pp.200-222.
Suki, N.M. and Suki, N.M., 2017. Modeling the determinants of consumers' attitudes toward
online group buying: Do risks and trusts matters?. Journal of Retailing and Consumer
Services. 36. pp.180-188.
Taylor, E., 2016. Mobile payment technologies in retail: a review of potential benefits and
risks. International Journal of Retail & Distribution Management.
Tian, F., 2017, June. A supply chain traceability system for food safety based on HACCP,
blockchain & Internet of things. In 2017 International conference on service systems and
service management (pp. 1-6). IEEE.
Toufaily, E. and Pons, F., 2017. Impact of customers' assessment of website attributes on e-
relationship in the securities brokerage industry: A multichannel perspective. Journal of
Retailing and Consumer Services. 34. pp.58-69.
ur Rehman, M.H aqnd et. al., 2016. Big data reduction framework for value creation in
sustainable enterprises. International Journal of Information Management. 36(6). pp.917-
928.
Varghese, J. and Sudhahar, J.C., 2018. An analysis on the impact on customer trust in the digital
era with special reference to age group. SMART Journal of Business Management
Studies. 14(2), pp.33-39.
Wollenburg, J and et. al., 2018. Configuring retail fulfillment processes for omni-channel
customer steering. International Journal of Electronic Commerce. 22(4). pp.540-575.
28
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
29
1 out of 29
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.