• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Before looking at the alternative architectures available, we first need to look at the current architecture that is implemented within the company. Current Architecture Previous is a high street clothes shop

Extracts from this document...

Introduction

Previous Clothes shop Report Produced by Susan Beevers 21st August 2004 Index Section Page 1. Current Architecture and information systems 3 2. Alternative architectures and information systems 3 3. Implementation 4 4. Security implications and System security 6 5. Information requirements 8 6. Other information 9 7. Summary 10 Section 1 Current architecture and information systems Before looking at the alternative architectures available, we first need to look at the current architecture that is implemented within the company. Current Architecture Previous is a high street clothes shop, with medium size outlets in 20 major cities and towns around the country. The current IS architecture consists of: * Large mainframe with 50 terminals around the head office * 25 PCs are also used as stand alone tools for word-processing and spreadsheet work. The managers' secretaries and the accounts department mainly use these. A LAN connects the PCs in the accounts department (20 of the 25 stated above) * The following systems are currently in use on the mainframe: * accounts * payroll * stock control * order processing * Each store is managed either by manual systems or by use of PC software as the local management wishes. Currently 5 of the shops have a PC * Orders from the previous day are phoned from the branches to the head office each morning and delivered on the next delivery day for that branch (i.e. each store has two delivery days per week e.g. Leeds is Monday and Thursday) Section 2 Alternative architectures and information systems The following are a number of suggestions that can be implemented to improve the performance of the company and update the current technical awareness. ...read more.

Middle

As the shops will only being using the machines to access the order database it would be more economically viable to give them the older upgraded machines and the accounts department who use the machines on a regular basis the new ones. Stage 6 * Develop a web page for customers to view the products available The final stage of the implementation is to develop a web page for customers to access to view products and make purchases. A staff area can be created for shop staff to access a bulletin board for latest information and the web based orders database. Information can be placed on the web site such as location of shops, contact details of shops and products available. Section 4 Security Implications and System Security It is important that controls are placed within systems to ensure the accuracy, reliability and integrity of the data that is provided by all users. The system can be vulnerable from various kinds of attacks, such as: * Virus attacks * Unauthorised users * System failure * Accidental damage These issues can be solved by simple procedures such as encryption, password protection and physical security. The mainframe itself should be protected by a firewall to ensure that any unauthorised user cannot gain access to the system. * Virus attacks Antivirus software should also be used on all individual computers and the mainframe to ensure the system is safe against all current viruses. The software should be updated on a regular basis to help prevent against all the new viruses that are created. * Unauthorised users Each individual staff member at the head office should have a logon to access the system. ...read more.

Conclusion

currently in a weak position on its cash flow and so could not afford a large investment up front * Computer hardware should be upgraded to a standard specification to cope with the new system * All computers need to be connected to the mainframe and protected from viruses and unauthorised users by use of antivirus software and a firewall * A business account can be set up with hardware vendors to reduce the cost of purchasing hardware * Software can be purchased through a licensing deal to reduce costs of software * A web page and web based front end database need to be created to compete with competitors * A pilot should be carried out in at least 2 shops to ensure that all problems are fixed before rollout of the new system takes place * Training for staff needs to be purchased so that they can use the new system * IT technicians can be employed to look after the new system * Backups need to be in place to ensure that the data is secure * Passwords and encryption need to be in place to ensure that only authorised users can access the system * Management information systems and executive information systems need to be in place on the mainframe so that middle management and senior management can make decisions to benefit the company and its future * Processing controls need to be in place to ensure the accuracy of the information collected * Government legislation needs to be adhered to and all staff made aware of the Data Protection Act and Computer Misuse Act ?? ?? ?? ?? Previous Clothes Shop Report Page 2 of 10 Created on 04/05/2007 ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level ICT in Business section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level ICT in Business essays

  1. I have selected a nursery because there is high demand in the UK as ...

    18% of people said that they did not have access to their own transport. I have to keep this in mind when situating my nursery. This is so that it should have reasonable transports links, or be accessible for customers.

  2. Analysis of The Cadbury company.

    The assessment of objectives can appear judgmental and threatening if senior management lack the necessary interpersonal communication skills. 2. When unrealistic objectives are set the resulting failures can be demotivating 3. Management of all levels must be convinced of the value of the exercise otherwise it will become a meaningless

  1. Analysis of The Cadbury company.

    Cadbury's makes financial contributions such as giving money in special appeals, investing funds in products tackling social priorities. Cadbury's financially supports charities and community organisations. Cadbury sponsors community focused events or activities. They donate a percentage from sales of products linked to a cause.

  2. Business report on Marks and Spencer.

    Computers can also be used as simulators this could be simulating an aircraft to train pilots or simulating a database to help train staff that will be using it. In either scenario real life situations are simulated and the trainee can learn without the danger of performing live experiments.

  1. Implementation of ATMS at SBI. Banks in India are looking at deploying biometric ATMs ...

    Modes of connectivity include leased lines, VSAT, CDMA and/or other wireless devices. � Bank has come out with our own dedicated network (State Bank Connect) and most of the ATMs along with CBS are operating on this network, managed by Datacraft.

  2. In this coursework I need to produce a detailed business report on one medium-sized ...

    * It is argued that many of these companies are inflexible due to their size. For example they find change difficult to cope with. Tesco plc. is large, private sector organisation. As it is providing-service organisation I can classify it as tertiary sector organisation.

  1. The purpose of this document is to define the Context of Cain Motors Information ...

    Time constraints applied by the project board to complete any approved request for change do allow sufficient time for this change further at the present time. 3.5. Change request Number 6 The request to redevelop/redefine some users views within the application front end application to print a report rather than

  2. The process of electroplating and how it is used to protect products.

    Now we fill the cell with a solution of a salt of the metal to be plated. It is theoretically possible to use a molten salt, and in rare cases that are done, but most of the time the salt is simply dissolved in water.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work