IT 210: Business Systems Analysis 3
IT 210: Business Systems Analysis
Glam Cloth Line
Lawrence McClendon
Contents
Introduction 4
Problem Statement 4
Two Technologies 4
Business Requirements 4
Objectives 4
Project Description 4
Technology Requirements 5
Competitors and Technology 5
Mobile, Wireless Computing and Mobile Commerce 5
Big Data/Knowledge Management System 5
Technology Benefit 6
Technology Solutions 6
Technology One 6
Technology Two 6
Recommendations 6
Technology Solution 6
Overall Benefit 7
Basic Security Considerations 7
Security Features 7
Third-Party Vendors 8
Internal Safeguards 8
Glam Cloth Line
Introduction
Problem Statement
Inadequate online presence has been preventing Glam Cloth Line from easily and effectively reaching its clients. Thus, the loophole has enabled their customers to have a solid marketing edge over Glam Cloth Line. Today, the small firm has a limited website that allows clients to view several products but does have other critical aspects that support ordering, order customization, or order delivery. Besides, Blakes Boutique does not own the software or hardware needed to develop a functional website that will enable clients to customize, order, and ship the product. The only purchasing medium existing on the website is the normal brick-and-mortar.
Two Technologies
Mobile, wireless computing, and mobile commerce will be important to enable Glam Cloth Line to list its items online in a convenient platform that allows clients to browse, identify, order, and recompence their orders, whether they are in-store or online.
Big data/knowledge management system will significantly use Glam Cloth Line by acquiring, organizing, disseminating, and organizing external and internal information. A solid big data/knowledge management system will allow them to manage the security problems and ensure that client information is securely kept, which will still be easily reachable to the personnel and clients.
Business Requirements
Objectives
Objectives according to their importance
Comply with all e-commerce laws valid to a business
Promote the security and protection of client information from being accessed by third party access or being misused in any manner;
Ensure that it is financially feasible to acquire and maintain for the company;
Easy to use, enabling clients to conveniently and easily find, choose, customize, and buy their selected orders; and
A user-friendly business that enables the employees to conveniently and effectively develop listings and create options and other essential selections required by the client.
Upon achieving the given objectives, Glam Cloth Line will readily launch into the e-commerce setting, which will help increase its competitiveness and customer relations.
Project Description
Glam Cloth Line seeks to acquire a computer system, software, and hardware to blend e-commerce with the big data/knowledge management system to enable clients to shop online instead of physically visiting the store. Accordingly, this would help create an extensive online presence, allowing the company to be more consumer-oriented and increasing its competitiveness.
To accomplish the objectives, it is important to research, determine, and adopt a new software and hardware system that is affordable, effective, convenient, and safe.
After finalizing the project, the Boutique will have drawn the benefits and shortcomings of the two selected projects and recommend the most effective one to solve organizational problems while achieving its objectives.
Currently, a business requires establishing an online presence to promote the interests of its customers and the company’s competitiveness. This will allow the firm to reach more clients. To achieve such, the business should have adequate technology to establish an online attendance while promoting the security and safety of customer data. Failure to possess sufficient technology could result in a security violation or a failure of the attempts of e-commerce.
Technology Requirements
Several technologies will be required to solve the Glam Cloth Line problem adequately, including a database system, domain names, programming requirements, networking (such as IP/TCP and other protocols), and a web server. A database system will be acquired and connected on a local server, enabling the six computers in the workplace to acquire customer data. A fast/sturdy internet service will be required that tolerates all the computers to access the webserver with a security program and a strong firewall to ensure customer information security. A domain name is required, although the one being used in the basic website is adequate. The domain name must be memorable and easy; for example, glamclothline.com. The web server will comprise the server (hardware), web editing tools, server browser, and server software. These tools can be acquired and installed on the server in the physical office or be leased and managed by a different hosting firm. A local server will be needed with six computers in the workplace. One computer would be for the CEO, two for in-store sales, and three for the e-commerce sales (the systems will be centralized). Lastly, the selected database software will be comprehensible, allowing searches, filters, store account data, reports, and securely store account information as well as credit card information while allowing employees to add, maintain, and delete product orders.
Competitors and Technology
The key competitors for Glam Cloth Line are Macy’s and Kohl’s; hence it is crucial to research their technological systems to learn which, if any, of their systems will effectively serve Glam Cloth Line.
Mobile, Wireless Computing and Mobile Commerce
Macy’s have focused on e-commerce which has broken their technological costs and mobile expenditures into three mobile buckets, including My Stylist, My Stores, and My Wallet (Grill-Goodman, 2019). They have adopted mobile, wireless computing, and mobile commerce into an efficient and fantastic application that is downloadable on users’ smart devices and accessible from their home desktop or any other place of their preference (Grill-Goodman, 2019). The app enables them to purchase either in-store or online. Moreover, they have available options either to pick up from the store or have their orders delivered home. Macy’s My Stores enables users to have an interactive outline of the store to search and select items (Grill-Goodman, 2019). My Stylist was launched recently and allows users to connect with online stylists for tips and advice.
Big Data/Knowledge Management System
Kohl’s has adopted the new newly developed Oracle Retail Merchandise Operations Management solution enabling it to “synchronize an integrated system of inventory record to improve services for multi-channel clients and simplify the user experience in the business (Wilson, 2019). The program is used to improve and streamline pricing, promotions, and inventory operations, enabling them to improve how promotion or a product performs in stores and online. The Oracle solution has enabled them to regulate their pricing, deliver simplified merchandising, optimize performance, offer a real-time performance view, and establish a foundation that enables continuous growth (Wilson, 2019).
Technology Benefit
Kohl’s has benefited significantly from the Oracle software by improving efficiency, enabling consistent growth, and streamlining business. Oracle Retail provides Kohl’s merchants with high visibility to make informed decisions with improved data to enhance performance at the store and product level. According to Janet Schalk, the executive VIP and CIO at Kahl’s, ‘Equally important, the Oracle Retail implementation establishes a foundation for future growth and innovation”. I believe that this would be significantly beneficial to Glam Cloth Line as it meets all its current needs, supports mobile applications, and offers room for growth and while the app is not that much interactive as that of Macy’s, it is quite efficient and simple to meet all the desired objectives.
Technology Solutions
Both Wireless, mobile computing and mobile commerce and big data/knowledge management systems offer benefits and shortcomings to Glam Cloth Line:
Technology One
Wireless, mobile computing, and mobile commerce meet the standard needs, including client order and payment status, employee-customer collaboration, inventory and logistics management, online shopping, integration and reporting, and customer database, which are essential for the brick-and-mortar business. Additional benefits of the technology include better data, targeted timing, affordability, rapid expansion, scalability, and global reach. Targeted timing will enable the Glam Cloth Line to advertise its service when a customer is highly likely to place an order in the evening before bed or during lunch breaks. It will also enable fast growth in the occasion that the mobile application is successful. Moreover, it is affordable for small businesses like Glam Cloth Line without exposing the coffers to high tax rates. (Agrawal, 2017).
Technology Two
Big data/knowledge management meets the standard requirements, including customer database, inventory and logistics management, online shopping, client order status and payment processing, employee-client interaction, reporting, and integration with the brick-and-mortar business side. Additionally, it also offers protection against fraud through data analysis, as it can regularly identify inconsistencies that are mostly associated with the fraud. However, the technology is associated with significant weaknesses. It can only be operated and managed by competent employees. It is also subject to adhering to government regulations. When using the system, there is a lot of information that should be protected, and the government has developed various guidelines for doing such. Furthermore, the system also has issues with data quality when working with such large data sets. Moreover, the software and hardware systems costs are significantly substantial. When considering employee training, adherence to government standards, and competent workers, the system is very expensive and beyond the financial capacities of a small firm like Glam Cloth Line. (Le & Liaw, 2017).
Recommendations
My recommended system for Glam Cloth Line is wireless, mobile computing, and mobile commerce.
Technology Solution
I recommend the system because it fulfills the needs of Glam Cloth Line, including protecting customer information, facilitating online ordering and payment, employee-client collaboration, data management, and shipping and invoicing, all of which promote the firm’s growth and is significantly affordable. Although the big data/knowledge management system is an extremely beneficial strength to the firm, I believe that its overall needs and costs would be much of a shortcoming rather than a advantage to a smaller firm.
Overall Benefit
Generally, wireless, mobile computing, and mobile commerce will enable Glam Cloth Line to establish an online shop that will allow clients to order, pay, view invoices, monitor shipments, view order history, and the employee contacts. It will also allow the firm to receive payments, integrate with the brick-and-mortar store, manage inventory, track client consumption status, and manage data and storage. Moreover, the targeted timing would enable the firm to target clients during their high peak expenditure times according to their consumption history and provide brands with explicit targeted advertising.
It will improve efficiency through producing one system to accomplish client inventory and other data in a specific location for both the brick-and-mortar business side and the mobile app.
By adopting an entirely cohesive system with inventory monitoring, data management, client purchasing, and interest tracking, the Wireless, mobile computing, and mobile commerce system will enable Glam Cloth Line to assess the brick-and-mortar store and mobile app, while seeing areas and trends where sales begin taking off so that they can hire personnel and order inventory when they see business growing and picking up enabling them to be ready for the growth.
Basic Security Considerations
The Mobile, wireless computing, and mobile commerce systems have multiple security risks related to user misuse and wireless aspects. When using mobile or wireless commerce, it is critical to ensure that the system’s security is solid and the system users are informed to help minimize the risk of credential leaks, online fraud, hacking, and pirating. Besides, the system also increases data vulnerability because of the increased size of information transfers and storage. For such reasons, Glam Cloth Line should ensure that they adopt efficient privacy and security aspects to protect their clients.
Security Features
The security aspects that should be addressed to ensure the safety of customer data include:
Program and services, including Tokenization which will enable the identification of client data and payment details to be de-identified or encoded to be transmitted between the business and the customer (Mata, 2020).
Not use services that pass the client to a third-party service during critical stages in the checkout procedure (Mata, 2020).
Identify security resolutions that perform on all operating systems, platforms, devices, and in different languages and other servers/networks (Mata, 2020).
When evaluating solutions for data encryption, use standards-based and NIST-recognized format-preserving techniques (Mata, 2020).
Determining solutions that would tokenize data based on the firm’s native mainframes (Mata, 2020).
Ensure that all mainframes and computers are protected with trustable and up-to-date protection and antivirus software (Mata, 2020).
Ensure that a solid authentication for the clients, including phone number verification to assists in reducing the fraudulent acquisitions risks according to work to ensuring that it is the specific client making the acquisition (Mata, 2020).
Third-Party Vendors
When identifying a third-party vendor, it is important to ensure that the firm considers the following:
Research and evaluate all prospective vendors to ensure that they hold similar values as the firm on issues concerning protecting customer privacy and data.
Ensure that contracts involve Glam Cloth Line indemnification in case of a security violation. Ensure that there are ways that a client can work on their data, or they can depict that they are protecting clients’ data according to the already established values and outlined measures. Contracts should highlight specific data protection and an assessment system that ensures compliance.
Acquire service organization control (SOC) audit reports or perform their own audits to promote compliance standards and ensure data safety.
When possible, it is critical to store personal data and provide the third-party vendor access to essential data instead of enabling them to hold the data or data at their preferred location.
Maintain regular and solid communication with merchants to guarantee that they are complacent and hence negligent.
Internal Safeguards
Glam Cloth Line should ensure that its customers are safe from local data violations and employee misuse. There are multiple ways to help ensure customer data safety, including collecting and managing their essential information. Through limiting the amount of customer data collected and stored, the firm will be able to reduce the amount of information at risk and the information value to hackers and other parties who can misuse it (Vitunskaite et al., 2019). It is also critical to keep an inventory of the information. Understanding the information at hand, its storage procedures, the storage location, and the developed access protocols which limit who can access the data. Physical information should be monitored and safeguarded to prevent it from being breached or lost and reduce any attempts of misuse (Vitunskaite et al., 2019).
When training employees, they should be provided with specific passwords and usernames that have user control safeguards to certify that they can only access data that is relevant to their roles and jobs within the firm and track the data they can access and at what time (Vitunskaite et al., 2019). It is critical to use duty and job separation such that no specific personnel have much power or information access. Such will facilitate checks and balances to avert deliberate misappropriation and help identify vulnerabilities or mistakes in the information. Moreover, credit cards will be issued for costs and monitor how employees use and spend them. The credit card will have zero liability and fraud protection because it will protect the firm from liability on any fraudulent procedures.
Glam Cloth Line must ensure that all programs for security are up-to-date such that the firm is protected from viruses, malware, and other associated data threats (Vitunskaite et al., 2019). It is also critical that the cloth line develop a plan to handle any security or information breaches, including a response to cover any weaknesses, identify the affected prices, and the critical authorities and a personnel team to investigate issues and future problems.
Venturing in e-commerce comes with significant responsibility. It is critical to ensure that the cloth line adopts all the necessary precautions to protect the customers, their information, and the firm itself from financial collapse. Before progressing with any mobile solutions, all security problems must be addressed and implemented after integrating wireless, mobile computing, and mobile commerce to ensure the safe and effective expansion or upgrade to mobile retail.
References
Agrawal, R. (2017). Study of Mobile Commerce and the Various Mobile Security Issues. MERI-Journal of Management & IT, 10(1), 81-83.
Freedman, M. (2017, October 4). 9 Security Practices to Protect Your Business’s Sensitive Information. Business.com; business.com. https://www.business.com/articles/7-security-practices-for-your-business-data/
Grill-Goodman, J. (2019, May 17). Macy’s Pays to Make Mobile Best-In-Class. RIS News. https://risnews.com/macys-pays-make-mobile-best-class
Le, T. M., & Liaw, S. Y. (2017). Effects of pros and cons of applying big data analytics to consumers’ responses in an e-commerce context. Sustainability, 9(5), 798. https://doi.org/10.3390/su9050798
Mata, N. D. (2020). Analysis of Security in E-Commerce and M-Commerce. In Digital Privacy and Security Conference. (p. 74).
Vitunskaite, M., He, Y., Brandstetter, T., & Janicke, H. (2019). Smart cities and cyber security: Are we there yet? A comparative study on the role of standards, third party risk management and security ownership. Computers & Security, 83, 313-331. https://doi.org/10.1016/j.cose.2019.02.009
Wilson, M. (2019, July 28). Kohl’s optimizes item and store performance with Oracle Retail solution. Chain Store Age. https://chainstoreage.com/news/kohls-optimizes-item-and-store-performance-oracle-retail-solution
The post IT 210: Business Systems Analysis 3 IT 210: Business Systems Analysis Glam appeared first on PapersSpot.