Nobody downloaded yet

Information Security Strategy of IT Department at Eazee Shopping - Case Study Example

Comments (0) Cite this document
Summary
This paper "Information Security Strategy of IT Department at Eazee Shopping" focuses on the threats to information systems in the cyberspace. The researcher will then demonstrate the organisational policies of Eazee Shopping followed by physical and system security initiatives. …
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER94.9% of users find it useful
Information Security Strategy of IT Department at Eazee Shopping
Read TextPreview

Extract of sample "Information Security Strategy of IT Department at Eazee Shopping"

Download file to see previous pages The company works under supervision and guidance of Mr Sundeep Singh who is the CEO and controls entire strategic planning, corporate policy formulation & implementation and business control process. The supermarket chain aims to simplify its business selling process by offering all products through an online information management system. The company recorded revenues to be nearly 20 million in 2006 and aimed to increase its existing revenues to 3 times by introducing new order tracking and sales automated system. Indeed, this would enable the company to increase its existing target market as well as help increase revenue streams. For instance, the supermarket could also improve its value creation and value propositions offered to potential customers in the market. For instance, Eazee Shopping is also interested in using decision and executive support systems because they could provide pertinent information to top and middle-level managers. As a result, the induction of above-mentioned systems would reduce workload, facilitate business decision – making and problem – solving, and enhance productivity, effectiveness and overall organisational performance.
It is worthwhile to mention that information is considered an extremely valuable business asset across Eazee Shopping, which is usually created from sales and financial data. Indeed, the managers obtained information in the form of statistics regarding most sold products, most demanded products in different packages, changes and fluctuations in prices, profitability etc. This information is used not only to analyse the growth rate of Eazee Shopping Company but also to determine the effectiveness of the currently implemented product development, market development and diversification strategies and business policies. Also, the market research and sales information identify any underlying problems in advance, thereby enabling strategic planners to take corrective measures.  ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Information Security Strategy of IT Department at Eazee Shopping Case Study, n.d.)
Information Security Strategy of IT Department at Eazee Shopping Case Study. Retrieved from https://studentshare.org/information-technology/1744997-eazee-shopper
(Information Security Strategy of IT Department at Eazee Shopping Case Study)
Information Security Strategy of IT Department at Eazee Shopping Case Study. https://studentshare.org/information-technology/1744997-eazee-shopper.
“Information Security Strategy of IT Department at Eazee Shopping Case Study”, n.d. https://studentshare.org/information-technology/1744997-eazee-shopper.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Information Security Strategy of IT Department at Eazee Shopping

Department of Homeland Security

...Department of Homeland Security Abstract The information includes 14 pieces of information including articles and government documents outlining the formation of the Department of Homeland Security in 2002. The document by President George W. Bush in June of 2002 outlines the four organizational divisions and purpose. Other OIG and CRS reports focus on budget, management and deployment. Other articles give current updates on where the DHS is in recent years. And a final review shows the successes and failures for the past, present and future of the DHS. Keywords: DHS, OIG, CRS, ACE, GAO. Department of...
13 Pages(3250 words)Essay

Developing the Corporate Strategy for Information Security

...? Developing the Corporate Strategy for Information Security The Chief Information Security Officer (CISO)’s functions within an organization a. Three (3) specific functions of a Chief Information Security Officer (CISO) Assessment of the Risk One of the several functions of a CISO is to assess the risks associated with the confidentiality obligations bestowed on the organization and its stakeholders based on mutual benefits. Accordingly, CISO needs to analyze the potential threats associated with various crucial information of the organization that might hamper the interests of the organization on the whole or that of its stakeholders (Whitman & Mattord, 2010; Homeland Security, 2007). Example: Implementation of this function... in the...
6 Pages(1500 words)Research Paper

Outsourcing Information Technology Department

...stays on track, which will only add to the success of the decision. (2005) Reference Koch, Christopher. (2005). Don't Maroon Security. CIO Magazine - May 15, 2005. Retrieved on September 30, 2005 from http://www.cio.com/archive/051505/security.html Michael Muh, (2000). Cutter Consortium: The Cutter Edge E-mail Advisor http://www.cutter.com/research/2000 Marcia Angell, (2004) The truth about the drug companies. Random House, New York. Monster.com (2005). Retrieved October 23, 2005, from http://www.monster.com "Outsourcing Strategies - Guidelines for Evaluating Internal and External Resources for Major Information Technology Projects" (1998). Department of...
10 Pages(2500 words)Term Paper

Department of Homeland Security

...and respond to domestic emergencies, particularly terrorism”.( Media Resources,2006) It was in 2003 that the Department of Homeland Security assumed its duties and now it is running with over 200 000 employees, being the third largest cabinet department of the United States. The formation of this department by President Bush was a response act to the September 11th attacks in the United States. The mission of the office was stated as “to develop and coordinate the implementation of a Comprehensive national strategy to secure the United States from terrorist threats or attacks. The office will coordinate the executive branch’s efforts to...
6 Pages(1500 words)Essay

Information Security

...Information Security: Balance and Management Introduction Determining an appropriate level of information security is often complicated by the factthat different professionals, be they general managers or IT specialists, often perceive security needs through a different set of priorities. Security specialists often see complexity and increasingly secure systems as a desirable business practice (Angus, 2007; Miller, 2005) whereas general managers are more likely to view information security practices within a larger business context. The objective data demonstrates a couple of points quite clearly. First, as noted by Angus, the organizations that decide to implement the strictest types of security are often much less secure than... ...
4 Pages(1000 words)Essay

Outsourcing Information Technology Department

...Outsourcing Information Technology Department Outsourcing Information Technology Department The pharmaceutical industry has experienced some fundamental changes during the 1990s with widespread consolidation through takeovers, mergers, as well as strategic friendly acquisitions. This trend is set to carry on and it has been foreseen by some stock-market viewers that by the year 2010 approximately 50% of the world pharmaceutical market will be taken by merely 5 or 6 “big” companies, each with a market share around 10%. A recent report which reviewed three hundred company technology-decision makers pointed out that just twenty eight percent of associations suppose that IT...
2 Pages(500 words)Essay

Information Security

...for ensuring the safety, privacy and confidentiality of an information. Network security is a vital component in ensuring enterprise security. Network architecture, software and policies, VPNs, device management, network prevention and intrusion detection, wireless security etc are some of the elements which should be controlled properly to ensure the network safety. Nagarajan (n.d) has mentioned 9 principles or approaches for organizations to ensure the safety of their information. In his opinion, reviewing the principles given below will help an organization to formulate strategies for the information protection....
6 Pages(1500 words)Term Paper

Information Security

...up of the data and ensure strict monitoring of the employees with regard to the security policies. These are the additional ways by which OUMC Edmond can further enhance their information security systems. References Butler, J., (2001). E-disaster Recovery Means Continuous Availability. Information Management: Strategy, Systems and Technologies. CMS, (2006). CMS Policy for Information Security. Centers for Medicare & Medicaid Services, Pp. 1-5. Elky, S., (2006). An Introduction to Information System Risk Management. SANS Institute InfoSec Reading Room, Pp. 1-14. Ico, (No Date). Data Protection FAQs- For...
2 Pages(500 words)Essay

Department of Homeland Security

...attacks and guarantee security to the U.S citizens. The U.S Department of Homeland Security follows the rules and regulations passed by the Congress and enacted by the President. The cabinet agency operates under the leadership of a Secretary appointed by the U.S President. Security was the fundamental reason of developing the U.S Department of Homeland Security. The agency has an ultimate vision of guaranteeing a safe, secure, and resilient homeland that is against terrorism and other potential hazards (Department of Homeland Security 1). Indeed, the agency operates under three key...
2 Pages(500 words)Research Paper

Department of Homeland Security

...indicates suspicious activity around the wastewater processing facility. The citizens are demanding action. Given these unverified rumors, what do you do today? What types of terrorist activities should your Department of Water & Sanitation check for? What is your long-term strategy to protect your community? What help would you expect from the various Federal agencies? Does DHS provide "one stop shopping" for your solution? Security of critical infrastructure is highly important (Wilshusen 10; Lewis 77). Before going to take some actions against the terrorists, it is important to verify their existence and their true motives; this will be the first step. If it is...
9 Pages(2250 words)Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Case Study on topic Information Security Strategy of IT Department at Eazee Shopping for FREE!

Contact Us