Discover millions of ebooks, audiobooks, and so much more with a free trial

Only $11.99/month after trial. Cancel anytime.

Implementation of a Central Electronic Mail & Filing Structure
Implementation of a Central Electronic Mail & Filing Structure
Implementation of a Central Electronic Mail & Filing Structure
Ebook77 pages43 minutes

Implementation of a Central Electronic Mail & Filing Structure

Rating: 0 out of 5 stars

()

Read preview

About this ebook

As an adjunct to relevant courses, valuable insight for students and professionals already working in the field is provided and students are equipped with a detailed analysis of important issues. The subject is 'brought to life' through analysis which highlight the working of issues within a given setting.

LanguageEnglish
Release dateMar 27, 2014
ISBN9786185122065
Author

Patapios Tranakas

Tranakas Patapios, ed., Author, Writer, Scribe. Publications are available worldwide in a plethora of formats for the contentment of the reader.

Related to Implementation of a Central Electronic Mail & Filing Structure

Related ebooks

Teaching Methods & Materials For You

View More

Related articles

Reviews for Implementation of a Central Electronic Mail & Filing Structure

Rating: 0 out of 5 stars
0 ratings

0 ratings0 reviews

What did you think?

Tap to rate

Review must be at least 10 words

    Book preview

    Implementation of a Central Electronic Mail & Filing Structure - Patapios Tranakas

    As an adjunct to relevant courses, valuable insight for students and professionals already working in the field is provided and students are equipped with a detailed analysis of important issues. The subject is 'brought to life' through analysis which highlight the working of issues within a given setting.

    Table of Contents

    Title Page

    Implementation | of a Central Electronic mail & Filing Structure

    ABBREVIATIONS

    CHAPTER 1 | INTRODUCTION

    Security challenges

    CHAPTER 2 | PROJECT PROPOSAL

    Project overview

    Project limitations[6]

    CHAPTER 3

    E-mail Archiving

    E-mail dependence

    E-mail Opportunities

    Requirements

    E-mail intelligence framework

    E-mail Governance Framework

    E-mail Governance Program Drivers[17]

    E-mail governance foundation

    Assessments

    Threats

    CHAPTER 4 | WAREHOUSE DATA BUILDING

    Data warehouse requirements

    Data warehouse issues

    Measuring Performance

    CHAPTER 5 | Conclusion

    Leading to results

    Recommendations

    Bank of America project solution

    CHAPTER 6 | QUESTIONNAIRE

    Implementation

    of a Central Electronic mail & Filing Structure

    Patapios Tranakas Greece

    ––––––––

    Copyright Notice: by Patapios Tranakas. All rights reserved.

    Copyright Year: 2014

    ISBN[1]: 9786185122065 (27.03.2014) Copyright Owner: Patapios Tranakas,

    Greece No part of this book may be reproduced, stored in a retrieval system, or

    transmitted by any means without the written permission of the author.

    The above information forms this copyright notice: © 2014 Patapios Tranakas

    ABBREVIATIONS

    AUP: Acceptable Use Policy

    BofA: Bank of America

    CEO: Chief Executive Officer CMC: Computer Mediated Communication.

    CSR: Client Service Representative FDI: Foreign Direct Investment HIPAA: Health Insurance Portability and Accountability Act (U.S Congress 1996)

    IBM: The Big Blue , International Business Machines Corporation[2]

    ICT: Information and Communication Technology IT: Information Technology

    Malmail: Malicious Mail

    PCI: Payment Card Industry

    PLC: Public Limited Company ROI: Return On Investments

    SEC: Securities and Exchange Commission (U.S) SMART: Specific. Manageable. Assertive. Relevant. Timely.

    TPCH performance benchmark: Transaction Processing Performance Council

    CHAPTER 1

    INTRODUCTION

    These are exciting time for business and business investment in technology. Harvard business school professor of information technology Warren McFarlan claims the world is witnessing in real time the largest build out of information technology ever. Corporate growth comes in different shapes and forms.

    Some see their firms grow through mergers and acquisitions. For others, growth comes from extension of internal networks to those of partners, suppliers and outsourcers spanning the globe.

    Firms that will benefit most in this exciting and new environment will focus on more than just growing the top line. Winners in the real world will be those that not only command but above all demand growth and excel in operational efficiency. Global infrastructures should be optimised to plan, execute and manage change quickly, efficiently and securely.

    Business relationships regarding the global infrastructures could either facilitate growth or bring a firm to its fiscal knees if not predicated on sound risk management policies and procedures. Corporate officersSMART in the near future should have a deep understanding of how network relationships are formed on their network.

    At the heart of such relationships will be robust security services destined to reside in the core of the infrastructure in self-reliance, self-assessment mode. Corporate improvement towards excellence can only be achieved for the firms that see and comprehend fully the relationship between people, applications and assets on their network as it occurs in a real time environment.

    "Talking about intelligence as a security differentiator, is something that I am seeing quite a bit from enterprise accounts as look at in terms of how to improve their network liability, lower the operational cost and deliver networking securely as a service to the business units. The

    Enjoying the preview?
    Page 1 of 1