Improving Communication and Information Systems for a Private Retail Company

Verified

Added on  2023/06/13

|15
|702
|127
AI Summary
This presentation discusses the existing communication and information systems for a private retail company, including meetings, workshops, written excerpts, telephone, video conferencing, internet, email, transaction processing systems, customer relationship management systems, database management system, store information system, and IoT devices. It proposes a plan to improve these systems, including online change readiness surveys, team meetings, training, informal gatherings, social media chat box system, encryption, firewall, anti-malware and spam controls, records and information management planning, network cache, cloud-enabled network cache, and optimizing existing applications. The plan aims to manipulate huge data, store information of all the employees and customers, faster fetching of data, protection from malicious malwares, and protection from suspicious access.

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Assignment Title
Name of the Student
Name of the University
Author Note
Private retail company

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Existing communication systems
Meetings and conferences for sharing information
One-to-one meetings
Workshops and training events for employee
Document Page
Existing communication systems continued…
Written excerpts for notice board and news bulletins
Telephone for employee communication
Video conferencing
Document Page
Existing information systems for collecting the
information
Internet and email for distribution of business related
information
Transaction Processing Systems
Collect data from user inputs
Provide option through which user select the relevant points
Customer Relationship Management Systems
Track customer activities
Data about purchasing trends
Customer inquiries

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Existing information systems for storing
information
Database management System (DSMS)
Organize data in a database
Data storage management
Security management
Data transformation and presentation
Backup and recovery management of data
Store Information System
Store address and contact information
Store equipment and device information
Geographic information
Import/export data through Excel
Document Page
Existing information systems for sharing
information
E-mailing the data fund with the employees
Preparing presentations regarding the outcomes of
the business
IoT devices
Automation in sharing data through company’s
employee and customers
Document Page
Plan to improve existing communication
Online Change Readiness Surveys for genuine response
Team meetings rather than conferences
Anonymous Electronic Feedback

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Plan to improve existing communication
continued…
Training to the employee for development in
knowledge base
Informal gatherings twice in a month
Establishment of organization’s social media chat
box system
Document Page
Plan to improve information security system
Controlling access to information
Encryption of all the data sent through internet source
Encryption can be accomplished through cloud solutions
to meet industry security compliance standards
PCI DSS
AICPA SOC 2
ISO 27001
File access permission management
Protection from data loss
Protection from unauthorized access
Protection from malware installation
Document Page
Plan to improve information security system
continued…
Developing legislation for data protection and privacy issues
Regulation for breaching the security compliance standards
Details of compensation once security system gets breached
Installation of Firewall
Acts as a gateway and detect all suspicious sites
Safeguards data from attack
Blocks Trojans
Anti- malware and spam controls
Save bandwidth and storage space
Eliminate connectivity failures
Additional protections of anti-virus and anti-phishing

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Plan to improve information storage system
Assessing your organizations’ Records and Information
Management requirements
Records and Information Management planning includes
Determining Responsibility
Standardizing Company Document
Implementing Filing Systems
Storage of Records
Implementing Records Privacy and Confidentiality
Data no longer needed can be archived
Password protected database
Document Page
Plan to improve information storage system
continued…
Deploying network cache
Increases the performance of system without
replacing current data protection policies
Suitable to cache both read and write I/O
Incorporating cloud-enabled network cache
Allow to store a huge amount of data
Offer access to all the member of the employee to
access the data
Optimizing the existing application
Availability of more storage space
Document Page
Benefits of the plan
Manipulation of huge data
Storing information of all the employees and customers
Faster fetching of data
Protection from malicious malwares
Protected from suspicious access

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Reference List
Chang, V. and Ramachandran, M., 2016. Towards achieving data
security with the cloud computing adoption framework. IEEE
Transactions on Services Computing, 9(1), pp.138-151.
Liu, J.K., Liang, K., Susilo, W., Liu, J. and Xiang, Y., 2016. Two-factor
data security protection mechanism for cloud storage system. IEEE
Transactions on Computers, 65(6), pp.1992-2004.
Liu, Z., Li, T., Li, P., Jia, C. and Li, J., 2018. Verifiable searchable
encryption with aggregate keys for data sharing system. Future
Generation Computer Systems, 78, pp.778-788.
Makeshwar, P.S. and Borse, G., 2017. Improving Security in Group
Based Data Sharing Using Multicast Key Agreement. International
Journal of Engineering Science, 4468.
Mun, M.Y., Kim, D.H., Shilton, K., Estrin, D., Hansen, M. and
Govindan, R., 2014. PDVLoc: A personal data vault for controlled
location data sharing. ACM Transactions on Sensor Networks
(TOSN), 10(4), p.58.
Document Page
1 out of 15
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]