Need a perfect paper? Place your first order and save 5% with this code:   SAVE5NOW

IT System Recommendations

Samsung Inc. is among the world’s leading manufacturers of electronic devices. It specializes in the manufacture and sale of industry and consumer electronics and appliances, integrated systems, and media storage devices. The company contributes to approximately one-fifth of the country’s total exports. The company first entered the electronics business in 1969 with various production divisions (Haizar et al., 2020). Samsung’s first electronic equipment was black and white television sets. In 1970s, the company started exporting its electronic products to other countries. The business experienced tremendous growth and separated the semiconductor and electronics division. In 1985, the company established Samsung Data Systems to serve the growing demand for systems development (Haizar et al., 2020). Additionally, the company started two research and development schools that enhanced its technology production lines into nanotechnology, polymer chemicals, electronics, aerospace, telecommunications, and semiconductors.

A distribution channel refers to a set of intermediaries or organizations that facilitate the availability of a product or a service to the end user or consumer. Samsung, unlike its competitors, sells its products to retailers who are willing to trade their products (Haizar et al., 2020). Additionally, the company sells its products directly to the end users. The company is currently working on a powerful distribution channel called Samsung Team of Empowered Partners STEP to distribute its wide range of products (Haizar et al., 2020). Although the company has worked previously with partners, STEP will provide a more structured way that will ensure shared success with its partners.

Information systems play an important role in business management, decision-making, and change implementation. Samsung needs an information system to serve multiple purposes. Firstly, the company needs information systems to store and analyze data (Ismagilova et al, 2019). Such data include personnel information, products catalogues among others. At the same time, the information systems analyze information such as employee performance using specific performance indicators. The results assist the company in decision-making (Ismagilova et al, 2019). Second, the company needs information systems to simplify its business process. For instance, the growing need for an online shop requires information systems, which simplify shopping. Additionally, goods displayed in an online store are neatly arranged, which makes shopping seamless. Third, Samsung management needs to have an access to full data control. The company needs a robust information security system to safeguard its information from attacks.

Information systems of Samsung Inc

The scope of information systems of an organization refers to “The combination of human and computer-based resources that results in the collection, storage, retrieval, communication, and use of data for the purpose of efficient management of operations and for business planning (Ismagilova et al, 2019). The company utilizes specific information systems for different purposes. They include a transactional processing system, management information system, strategic information system, decision support system, and executive information system.

Transactional Processing System (TPS)

A transactional processing System refers to an information system that enables business transactions through collecting, retrieval, and data modification. Unlike the traditional batch processing system, TSP ensures all transactions are real-time. Additionally, transaction processing systems are associated with characteristics such as performance, consistency, and reliability, which enhance business transactions. Samsung’s TSP supports both online and regional stores’ transactions and eliminates the possibility of delays that would affect its business (Teubner & Stockhinger, 2020). The company links its TPS with online payment systems that enable customers to make orders and pay for goods online.

Management Information System (MIS)

A management information system refers to a set of multiple information systems that collect data from various sources and departments and analyze it. The information is later processed into a readable format and is used for making serious decisions in the company (Teubner & Stockhinger, 2020). The success of a management information system as a key decision making tool depends on the speed, accuracy, and adequacy of the staff that manages it. The key benefits of a robust management information system include improved accuracy, fast coordination, reduced operational costs, and enhanced quality of human capital (Teubner & Stockhinger, 2020). Samsung Inc. uses an advanced management information system mainly for supply chain management, enterprise resource planning, market research, and financial management. Additionally, the company uses the MIS to monitor employee performance based on data collected about their output.

Strategic Information System (SIS)

The strategic information system is a system that manages information that may either support or alter an organization’s strategic plan. Organizations use the strategic information system to take a competitive advantage over competitors. The main applications of SIS in business are to support the company’s cost leadership strategy, differentiation strategy, innovation strategy, growth strategy, alliance strategy, and quality strategy. After gathering data on market trends, competitors, similar goods, and changes in preferences by consumers, organizations use the SIS to make decisions that determine their fate (Yoshikuni & Albertin, 2018). At Samsung Inc., the company uses the SIS to determine the price of its products, improve product quality, differentiate its products, and bring new innovative strategies.

Information Technology Recommendations for Samsung

The advancements in computer engineering and technology in the past ten years create a need for organizations to change or improve their existing information systems to remain relevant in business (Yoshikuni & Albertin, 2018). Some of the recent advances include the latest computer system architecture that supports big data, information visualization, and data fusion technologies. The latest cases of hacking and data theft require companies to design information systems that are tamperproof and can serve the latest business management needs (Yoshikuni & Albertin, 2018). Although Samsung has embraced information systems, it needs to adopt information technology that supports and enhances the efficiency of its information system at different level.

Automation and data security remain key issues in modern information technology. An automated system is supported by a network that ensures different departments can automatically access information within its authority without delays (Yoshikuni & Albertin, 2018). Companies need to protect data and personal information from malicious people by enhancing system security, which requires additional systems for back up and information protection. Samsung needs to focus on enhancing information security to prevent data loss.

Data Backup and Data Recovery Technology for Samsung

Organizations suffer a threat of data loss to malicious individuals. It is, therefore, important for organizations to use the latest backup technologies that enable them to retrieve important information in case of data breach. Data backup is an information technology strategy that integrates techniques and hardware to copy and store data in different locations (Zhao & Lu, 2018). The technology enables companies to access information incase data is lost at some point due to vandalism and deliberate deletion of information by rogue staff. Organizations set up backup frequencies to ensure they store the latest information.

Benefits of an up-to-date Data Backup and Recovery Technology

The implementation of a modern backup and recovery technology will enable Samsung to access information in case of data breach. This enables business continuity even with the increasing cases of business disruptions caused by loss of important information (Zhao & Lu, 2018). A decentralized backup technology for Samsung will facilitate the recovery of information from cloud servers in case of data loss. Samsung’s backup and recovery will require two main elements namely software and hardware. The software will manage the data and organize it in the storage backup while the hardware store the actual data (Zhao & Lu, 2018). Samsung needs to acquire storage devices that have sufficient storage abilities to hold large amounts of data. The system needs to be specifically networked to enable transmission of data from office computers to different backup locations. This network will also enable the retrieval of data from cloud and physical backup locations. Samsung should use local area networks and the internet to facilitate the transfer of data to and from the backup centers. Since Samsung Inc. does not deal with software design, it will outsource both hardware and software from data protection companies.

End-user Computing Needs for Samsung’s Backup and Recovery Technology

Backup and recovery technology requires a team of IT professionals to backup and retrieve information as needed by the organization. However, there is a need to have a team of end-users who can grasp basic technology that enables them to create functional applications without the need of hiring programmers and software developers. Samsung therefore needs to hire and train data management and data processing staff and end-user support staff to lower the cost of data backup and retrieval.

Potential Security Threats and Recommendations

The recent adjustments in information technology pose serious concerns pertaining to the risks to data arising from weak information technology security. Some of the serious threats to data security include the vulnerability to malware and virus attacks, phishing, and deliberate compromise of network systems (Zhao & Lu, 2018). Inadequate information security technology may cause unauthorized access to data and compromise confidentiality and data integrity. Organizations such as Samsung, therefore, need to implement information security measures to ensure their data is secured.

Cyber security threats are divided into technical and non-technical threats. Technical threats involve the non-existence of any security architecture to protect data. Some organizations lack any security measures, which leaves their data vulnerable leading to loss of personally identifiable information (Humayun et al., 2020). Due to lack of resources and skilled staff, organizations may connect their systems directly to the internet, lacking any layer of protection. The lack of data protection layers exposes systems to malware and virus attacks. Non technical threats include unauthorized insider access due to the lack of a privilege management system, poor passwords, lack of physical security that may result in actual theft of information technology equipment, improper destruction of data strategies, which may result in data leakages, and social engineering where employees can be easily manipulated to give sensitive information that may lead to a breach in data security (Humayun et al., 2020). Organizations, therefore, need to design a robust data protection system to avoid data manipulation, loss, and external attacks (Humayun et al., 2020). Information security measures are divided into physical, management, and operational controls.

Physical Security Controls

Physical security controls refer to measures taken to protect data, hardware, and data protection personnel from physical attacks that would result in damage of hardware or tamper with the confidentiality, privacy, confidentiality, and the integrity of data, which may result in business disruption. Physical controls play the most significant role in data protection (Humayun et al., 2020). Without physical security, the implementation of other data security measures may not work properly. Samsung, therefore, needs to establish a robust physical security strategy (Zhao & Lu, 2018). This includes restricting access to backup centers to unauthorized persons, installing physical barriers such as fences, walls, and locks. Additionally, Samsung needs to install surveillance systems that ensure any unauthorized access is immediately noticed. Further, alarm and breach notification systems play a significant role in physical data protection (Humayun et al., 2020). Another remedy to physical threats involves deploying security staff to man the backup facilities. The security staff needs to be properly trained to manage backup centers and understand the possible tricks that malicious people may use to gain access to the facilities.

Data Encryption

Data encryption is a data protection strategy that ensures information is only accessible to authorized people. The process safeguards data and organizational documents from the prevailing threats such as hacking, spying, and criminal trespass (Humayun et al., 2020). Data encryption ensures data is secured even when hackers and thieves get access to it. Without the actual decoding strategy, outsiders and unauthorized personnel do not gain access to encrypted data. There are three forms of data encryption (Saračević et al., 2020). They include symmetric, asymmetric, and hashing. Symmetric encryption involves the use of a single (secret) key to encode and decode information. This form of encryption ensures individuals without the encryption key do not access the information in case it lands to unauthorized people. In its storage or transit state, the data is scrambled and unreadable (Saračević et al., 2020). Asymmetric encryption on the other hand uses two different keys, one public and one private, for encryption and decryption of data either in storage or on transit. Although this form of data encryption is more secure, it consumes more time to decrypt information than the symmetric encryption technique.

Social, political, and Diversity Impact of Backup and Recovery Technology by Samsung

Appropriate data protection and recovery laws build trust in systems by enforcing rights that protect individuals against the misuse of personal information. Every organization has the obligation to protect personal information from identity thieves. Organizations, such as Samsung Inc. collect personal information, such as credit and debit card information when consumers buy products from their online stores (Humayun et al., 2020). Leakage of this information may result in dire consequences to customers. It is, therefore, the responsibility of this organization to ensure proper security of the organizations data in its backup centers.

According to a global survey conducted in 2021, 51 per cent of global organizations suffered business disruption. The survey also revealed that only 91 per cent of organizations backup their data. However, 68 per cent of the organizations lose data due to software and hardware failure, power surges, accidental deletion, and theft of backup infrastructure (Humayun et al., 2020). Efficient data backup and data protection empowers business with the freedom to retrieve information in case of data loses, either accidental or through malicious acts.

Conclusion

Samsung Inc. employs robust information systems that enable it to run its business and have a competitive advantage over its competitors. The main information systems adopted by Samsung Inc. include transaction processing systems, management information systems, and strategic information systems. Although the organization backs up its information in various locations, the recent events of data losses and data breaches need a serious technological approach to avoid business disruption. Therefore, Samsung needs to adapt to the current technological advancements by implementing a modern data backup plan. This involves purchasing latest backup software and hardware. Backup facilities are susceptible to data loss due to vandalism, theft, disasters, and hacking. Samsung, therefore, needs to protect the backed up data by ensuring adequate physical security of the backup facilities. This can be achieved by restricting access to the facilities by employing qualified security personnel to guard its facilities from intrusion. Additional measures need to be put in place to restrict access to private information in case of data breach. This is achieved by ensuring the backed up information is properly encrypted and is only readable by individuals with the appropriate keys. Finally, data loss may pose serious political and economic implications to businesses. Data protection laws, therefore, need to ensure the protection of personal information.

References

Haizar, N. F. B. M., Kee, D. M. H., Chong, L. M., & Chong, J. H. (2020). The impact of innovation strategy on organizational success: A study of Samsung. Asia Pacific Journal of Management and Education (APJME)3(2), 93-104.

Humayun, M., Niazi, M., Jhanjhi, N. Z., Alshayeb, M., & Mahmood, S. (2020). Cyber security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering45(4), 3171-3189.

Ismagilova, E., Hughes, L., Dwivedi, Y. K., & Raman, K. R. (2019). Smart cities: Advances in research—An information systems perspective. International Journal of Information Management47, 88-100.

Saračević, M. H., Adamović, S. Z., Miškovic, V. A., Elhoseny, M., Maček, N. D., Selim, M. M., & Shankar, K. (2020). Data encryption for Internet of Things applications based on catalan objects and two combinatorial structures. IEEE Transactions on Reliability70(2), 819-830.

Teubner, R. A., & Stockhinger, J. (2020). Literature review: Understanding information systems strategy in the digital age. The Journal of Strategic Information Systems29(4), 101642.

Yoshikuni, A. C., & Albertin, A. L. (2018). Effects of strategic information systems on competitive strategy and performance. International Journal of Productivity and Performance Management.

Zhao, Y., & Lu, N. (2018, May). Research and implementation of data storage backup. In 2018 IEEE International Conference on Energy Internet (ICEI) (pp. 181-184). IEEE.

 

Don't have time to write this essay on your own?
Use our essay writing service and save your time. We guarantee high quality, on-time delivery and 100% confidentiality. All our papers are written from scratch according to your instructions and are plagiarism free.
Place an order

Cite This Work

To export a reference to this article please select a referencing style below:

APA
MLA
Harvard
Vancouver
Chicago
ASA
IEEE
AMA
Copy to clipboard
Copy to clipboard
Copy to clipboard
Copy to clipboard
Copy to clipboard
Copy to clipboard
Copy to clipboard
Copy to clipboard
Need a plagiarism free essay written by an educator?
Order it today

Popular Essay Topics