logo

Information technology assignment : Walmart Inc

   

Added on  2021-04-17

12 Pages2465 Words53 Views
Running head: INFORMATION TECHNOLOGYInformation Technology[Name of the Student][Name of the University][Author note]

INFORMATION TECHNOLOGY1Table of ContentsIntroduction:....................................................................................................................................2Discussion:.......................................................................................................................................2Information security model: Walmart:........................................................................................2Security standards and controls of Walmart:...............................................................................3Contingency plan and risk management of Walmart:.................................................................4Conclusion:......................................................................................................................................7References:......................................................................................................................................8

INFORMATION TECHNOLOGY2Introduction:“Walmart Inc.” is an “American multinational Retail corporation” which is associatedwith operations of a chain of “hypermarkets”, “discount department stores” and “grocery stores”.Its headquarters is situated in Bentonville, Arkansas and its founder is Sam Walton. This wasestablished in the year of 1962 and was incorporated from 31st October 1969. Sam’s Club Retailis also owned and operated by the Walmart Inc. Walmart is considered to be largest company interms of its revenue which is approximately around US $480 billion (walmart.com, 2018). Alongwith this it is also the largest private employer in the world which stands to be around 2.3million. Discussion:Information security model: Walmart:Information security model refers to the method that are used for the purpose of authenticatingthe security policies due to the fact that they are intended for providing of a precise set of ruleswhich is to be followed by a computer so as to implement all the processes and procedures whichare contained in the security policy. Walmart has been associated with implementation of lots ofinnovative technology with their information technology system. This has impacted their strategyof low price tremendously (Aziz, 2013). The organization has stand out to be a pioneer in thescanning of the barcode along with examining at the point of sale information which has helpedthem a lot in accommodating their massive data warehouses. In 1980s the company had launcheda satellite which has greatly helped in running all their business practices along with influencingtheir supply chain management as well. The strategic system of this organization includes link ofthe retail, sharing of the data and integration between the company and their suppliers, and is

INFORMATION TECHNOLOGY3spearheaded by industry. This system has helped in facilitating the concept of “vendoraccomplished inventory”. There is a substantial IS infrastructure and is considered as the largestcomputer system of the country. The IT strategy of the company has been supporting the “buildrather than buy” technique over years which has greatly helped in producing a business plan fullof innovation (corporatereport.com, 2018). IBM’s (POS) point of sale for supermarket which hasbeen hghly adapted by many supermarkets has also been implemented by Walmart at their everycheckouts. Security standards and controls of Walmart:One of the most import security standard adopted by Walmart for the purpose ofcontrolling all its information security is the ISO17799. A numbers of sections has been includedand is associated with covering of security issues at wider range. This standard has been adoptedby Walmart for different purposes and this includes the following:Assessment of the risks along with treatment of the risks. This section of the standardgenerally deals with the fundamentals of the risk analysis.Policy of the system so as to provide the management of the organization with directionsalong with supporting the information security or IS.Organizing the information security so as to manage it inside the organization and for themaintenance of the security of the information along with facilitating the processing’swith respect to any third parties.Management of Assets so as to achieve the appropriate protection of the organizationsassets along with maintaining them (Tran, 2016). Along with this it is also ensured thatan appropriate level of security is achieved by all the information.

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Interconnection of Business Units and Data Warehousing in Walmart
|14
|3870
|176

A Comparison of Financial Statements: Woolworths Group vs Walmart
|14
|2095
|66

Managing Information Systems
|11
|3059
|98

Management Information System and its Implications for Walmart
|12
|3538
|476

Organisational Communication: Analysis of Walmart Inc.
|15
|3974
|453

What is a Competitive Strategy: Types - Definition
|16
|3452
|24