Retail Business: Communication and Information Systems Improvement

Verified

Added on  2023/06/13

|15
|702
|127
Report
AI Summary
This report outlines a plan to enhance communication and information systems within a private retail company. It begins by assessing the existing communication systems, which include meetings, one-to-one sessions, workshops, written notices, telephone communication, and video conferencing. The report then examines the existing information systems for collecting, storing, and sharing information, such as Transaction Processing Systems, Customer Relationship Management Systems, Database Management Systems, and email. The plan proposes improvements including online change readiness surveys, team meetings, employee training, informal gatherings, and the establishment of an organization social media chat box system. To improve information security, the plan suggests controlling access to information, encrypting data, managing file access permissions, developing data protection legislation, and installing firewalls and anti-malware controls. For information storage, the plan recommends assessing record management requirements, implementing filing systems, ensuring data privacy, deploying network caches, incorporating cloud-enabled network caches, and optimizing existing applications. The benefits of this plan include improved data manipulation, comprehensive information storage, faster data retrieval, protection from malware, and enhanced security against unauthorized access. The report concludes with a reference list of academic sources supporting the proposed improvements.
Document Page
Assignment Title
Name of the Student
Name of the University
Author Note
Private retail company
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Existing communication systems
Meetings and conferences for sharing information
One-to-one meetings
Workshops and training events for employee
Document Page
Existing communication systems continued…
Written excerpts for notice board and news bulletins
Telephone for employee communication
Video conferencing
Document Page
Existing information systems for collecting the
information
Internet and email for distribution of business related
information
Transaction Processing Systems
Collect data from user inputs
Provide option through which user select the relevant points
Customer Relationship Management Systems
Track customer activities
Data about purchasing trends
Customer inquiries
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Existing information systems for storing
information
Database management System (DSMS)
Organize data in a database
Data storage management
Security management
Data transformation and presentation
Backup and recovery management of data
Store Information System
Store address and contact information
Store equipment and device information
Geographic information
Import/export data through Excel
Document Page
Existing information systems for sharing
information
E-mailing the data fund with the employees
Preparing presentations regarding the outcomes of
the business
IoT devices
Automation in sharing data through company’s
employee and customers
Document Page
Plan to improve existing communication
Online Change Readiness Surveys for genuine response
Team meetings rather than conferences
Anonymous Electronic Feedback
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Plan to improve existing communication
continued…
Training to the employee for development in
knowledge base
Informal gatherings twice in a month
Establishment of organization’s social media chat
box system
Document Page
Plan to improve information security system
Controlling access to information
Encryption of all the data sent through internet source
Encryption can be accomplished through cloud solutions
to meet industry security compliance standards
PCI DSS
AICPA SOC 2
ISO 27001
File access permission management
Protection from data loss
Protection from unauthorized access
Protection from malware installation
Document Page
Plan to improve information security system
continued…
Developing legislation for data protection and privacy issues
Regulation for breaching the security compliance standards
Details of compensation once security system gets breached
Installation of Firewall
Acts as a gateway and detect all suspicious sites
Safeguards data from attack
Blocks Trojans
Anti- malware and spam controls
Save bandwidth and storage space
Eliminate connectivity failures
Additional protections of anti-virus and anti-phishing
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Plan to improve information storage system
Assessing your organizations’ Records and Information
Management requirements
Records and Information Management planning includes
Determining Responsibility
Standardizing Company Document
Implementing Filing Systems
Storage of Records
Implementing Records Privacy and Confidentiality
Data no longer needed can be archived
Password protected database
Document Page
Plan to improve information storage system
continued…
Deploying network cache
Increases the performance of system without
replacing current data protection policies
Suitable to cache both read and write I/O
Incorporating cloud-enabled network cache
Allow to store a huge amount of data
Offer access to all the member of the employee to
access the data
Optimizing the existing application
Availability of more storage space
Document Page
Benefits of the plan
Manipulation of huge data
Storing information of all the employees and customers
Faster fetching of data
Protection from malicious malwares
Protected from suspicious access
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Reference List
Chang, V. and Ramachandran, M., 2016. Towards achieving data
security with the cloud computing adoption framework. IEEE
Transactions on Services Computing, 9(1), pp.138-151.
Liu, J.K., Liang, K., Susilo, W., Liu, J. and Xiang, Y., 2016. Two-factor
data security protection mechanism for cloud storage system. IEEE
Transactions on Computers, 65(6), pp.1992-2004.
Liu, Z., Li, T., Li, P., Jia, C. and Li, J., 2018. Verifiable searchable
encryption with aggregate keys for data sharing system. Future
Generation Computer Systems, 78, pp.778-788.
Makeshwar, P.S. and Borse, G., 2017. Improving Security in Group
Based Data Sharing Using Multicast Key Agreement. International
Journal of Engineering Science, 4468.
Mun, M.Y., Kim, D.H., Shilton, K., Estrin, D., Hansen, M. and
Govindan, R., 2014. PDVLoc: A personal data vault for controlled
location data sharing. ACM Transactions on Sensor Networks
(TOSN), 10(4), p.58.
Document Page
chevron_up_icon
1 out of 15
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]