Você está na página 1de 19

Contents

1.0 Introduction.......................................................................................................... 2
Mission and Vision................................................................................................... 2
Organization Chart.................................................................................................. 2
2.0 Marketing Using Information................................................................................ 4
2.1 Benefits of Information System.........................................................................4
2.2 Target Market.................................................................................................... 5
2.3 Product Segmentation....................................................................................... 5
3.0WebsiteDevelopment............................................................................................ 6
3.2 Hierarchy of the website................................................................................... 6
3.3 Categories of Menu........................................................................................... 7
3.4 Screenshot of the website................................................................................. 8
4.0 Security Measurement........................................................................................ 13
4. a)Network architecture...................................................................................... 13
4. b) Security Technologies Implemented..............................................................13
5.0 Technologies Used.............................................................................................. 15
5 a) Software......................................................................................................... 15
5 b) Hardware........................................................................................................ 16
Conclusion................................................................................................................ 17
Appendix.................................................................................................................. 18

1.0 Introduction
Love u Tart business is a dessert tart business located in the 1st Avenue Mall 10300 Georgetown,
Penang. We can describe as a customized tart where customers can choose their flavour topping
with four selections. This will fulfil customers need because there are many of topping or
selections for them to choose depend on their own taste. Therefore, the tart is our main selling
point. We will provide a combination of excellent tart at value price, with packaging. Love u Tart
is the result to an increasing demand for type of dessert, to be consumed while walking around
inside a shopping mall. The founder of our company is Mr. Bharat Raj. The idea of company
name is come from founder, he think that name are easily recognize and everybody love to eat
tart. In September 2013, Mr. Bharat Raj came out with this idea which is selling special egg tart.
He once went to Taiwan for trip and he found a food shop which sells the tart. He bought the
food and taste was so excellent. He thought the taste and outlook is completely different and
special with Malaysias tart.

Mission and Vision


Mission
To deliver an unique tart with boundless possibility, opportunity to create own favorite tart with
fabulous taste.
Vision
To be one of the representatives of online ordering desserts in Malaysia and become the first
choice of dessert whenever customers are having their delight tea time.
Objectives
Delivering a yummy tart to your doorstep along with our very own special topping tarts.

Organization Chart

These is the organization chart of Love U Tart company whereby at the top is the
founder of the company Mr.Bharath Raj. The public relation and product part is managed by
the Manager Mr.Dhushyendran. Furthermore, Ms.Halen is in charge of marketing and
operation section whereby she has to supervise the chefs, bakers and also the cashier. She
will be in charge to handle all operations in the company. Besides that, Mr.Eric will be in
charge of IT department whereby he will handling on the companys website by updating the
latest deals, promotions, and all other IT related matters. The overall team will be the
backbone of the entire business.

2.0 Marketing Using Information


2.1 Benefits of Information System
The main purpose of information systems are provide the right information to the right people at the
right time. It is used to track, store, manipulate and distribute the information from gathered data to
appropriate persons when necessary. One of the benefits of information system is communication. As an
example, in our Tart outlet we use a lot of technologies such as mobile, computer and etc. With the help
of this information technologies the instant messaging, emails, voice and video calls becomes quicker,
cheaper and much efficient.
This will make an easy way for customers to order through online. Moreover, by using this, system
our Tart outlet become available at anytime. This information system has made it possible for businesses
to be open 247. This means that our Tart outlet website can be open anytime anywhere, making
purchases easier and more convenient. It also means that we can have the goods delivered right to our
customer as soon as possible after they place their orders through online.
In these modern days, websites are the most effective way to get near to public. Peoples always like
to look at the websites of a shop before visiting it. By this way, the customers can get to know the
promotions that our Tart outlet promoting and can gain more information about the promotions. Other
than that, we also use the website to give more detailed information about our outlet. The information
system application promotes more efficient operation of the company and also improves the supply of
information to decision-makers.

2.2 Target Market


4

About places to sell our products, we had chosen to sell directly to our customers by operating
our business in a store outlet. We believe that in order to have good sales and public awareness
from customers, a good distribution for selling products is playing a very important role. Our
desire place for establish our business is 1st Avenue Mall Penang. This is because as a shopping
complex, 1st avenue mall are located in a beneficial area which will make us easily approach to
our target markets spending behaviour and lifestyle.
As all know, shopping complex is a busy place that filled with a lot of people no matter of age. Most
of the time the shopping complex is filled with families, teenagers and etc. Most of them like to eat tarts
which we are selling. So, the shopping complex is a suitable area to increase our selling of tarts. Other
than that, one of the reasons we choose the shopping complex at Penang is that Penang is a favourable
and famous place for tourists. Indirectly, when tourists go to shopping complex for shopping, this Tart
outlet will attract their attention thus they will be persuading to buy it.

2.3 Product Segmentation


The products we are selling in our Tart outlet are customized tart which we encourage customer to
design their own favorite tart with variable of choices of topping. Our tart crust are fresh made every day
and we will provide our customer the prepared fresh baked tart crust with one quarter of filling inside,
and the left three quarter of space are leave for customer to fill in their favorite topping. The tart fillings
we provide are two different tastes which are Original Egg tart and Cheese tart.
We have 4 different kind of topping that suit our customers tastes which are salty, nuts, candy,
and fruits. One of the reasons is that we choose this four topping is that teenagers prefer salty and nuts
topping compare to others. This is because they like the crunchy taste of salty and nuts topping. It can
attract their interest to buy. However, adults more prefer fruit topping compare to others because they
prefer a healthy snack than non-healthy snacks. And most of the children like candy topping because it is
sweet and has an interesting color that can gain their interest.

Salty
Ham
Cheese
Sausage
Chicken Floss
Tuna

Nuts
Cornflakes
Raisin
Almond
Apricot
Coco Crunch

Candy
Mash Mallow
Color Candy
M&M nuts
Chocolate Chips

Fruits
Grapes
Strawberry
Logan
Pineapple
Mango
5

Crabstick

Kiwi

3.0WebsiteDevelopment

A website is created for Love u Tart Company in order to capture online customers. This
website is actually free for all users. In addition to that, they dont need to pay any single
payment to browse the website. This website is a very friendly user. The information that is
available in the website is very much clearer to the browsers. The website is developed using a
website developing site known as weebly.com. This website has been designed with many
images of the tarts that is sold in Love u Tart company. The link of the website is
http://loveutart.weebly.com/. The website is being named as Love u Tart.

3.2 Hierarchy of the website

The hierarchy of the website shows that home is the main which is the landing page.
There are three main dropouts which are menu, contact us and also details of the company. These
3 main dropouts have their sub category of main information which is very much important for
web browsers. A video of the upcoming tart are also provided to notify the customers.

3.3 Categories of Menu


The categories that can be seen from the website are Menu, Contact Us and also About Us. The
categories in Menu are listed as the types of Tarts that is being arranged accordingly. The four
types of Tarts which is Salty, Fruits, Nuts and also candy are listed. The prices of the basic tart
are stated in the website page.

Contact Us
Besides the menu there is another dropout which is Contact Us. In these, the contact details of
the business are listed. To make things easier the email address are also provided for the
customers to communicate by giving their comments and suggestions if they feel to do so.
Besides that, for customers to track the location of the business, navigation maps are also
provided in the website. These will be very convenient for the customers to reach the business.

About Us
About us is also another dropout whereby the overview of the company and their vision, mission
and also their objectives are listed. Besides that, the organization charts of the company are also
being provided for customers view.

3.4 Screenshot of the website


8

1. The Home Page

These are the screenshot image of the main page. The latest deals, located area, varieties of tarts,
and the video of the upcoming tart are provided. The page is designed with images of colorful
tarts. The symbol of the business is also provided.

2. Menu Page
9

These are the screenshot of types of tarts. The varieties of the tarts are being placed in a table
accordingly. These are toppings which can be added on for the tarts by the customers. The price
of a basic tart is also being provided. The images of tarts which are with salty, nuts and also
fruits are being provided for the view of costumers.

3. Contact Us Page
10

These is the screenshot of contact us. In these, the contact details of the business are listed. To
make things easier the email address are given for customers to leave their comments and
suggestions. Besides that, for customers to track the location of the business, navigation maps are
also provided in the website. These will be very convenient for the customers to reach the
business.

4. About Us Page

11

These are the screenshot of About Us Page. About us is also another dropout whereby the
overview of the company and their vision, mission and also their objectives are listed. Besides
that, the organization charts of the company are also being provided for customers view.

4.0 Security Measurement


4. a)Network architecture

12

Diagram 1

4. b) Security Technologies Implemented


In this current world, hacking is something very usual. These days there are numerous
programmers and unapproved clients going onto the web to take data. It is shrewd for an
organization which claims a site to practice security safety measures so that unapproved client or
programmers won't get the opportunity to hack inside the organization's database server. There
are different sorts of approaches to keep them from getting their hand on the organization and
client's data, for example, developing a network architecture.
Network Architecture is the complete framework of an organization's computer network.
The diagram of the network architecture provides a full picture of the established network with
detailed view of all the resources accessible. It includes hardware components used for
communication, cabling and device types, network layout and topologies, physical and wireless
connections, implemented areas and future plans. In addition, the software rules and protocols
also constitute to the network architecture. This architecture is always designed by a network
manager/administrator with coordination of network engineers and other design engineer.

Diagram 1 above shows a network architecture which our company implemented. It is a


basic system design which comprises of 2 layers of firewall to keep programmers or unapproved
13

client from getting data about the client. Firewall is a security framework which avert
unapproved client to access the framework as the greater part of the clients will interface with the
database by means of web. The reason of having two layer of firewall is on account of if
unapproved client or programmers hack through the main layer of firewall, they could just turn
down the web server. Organization and client's data will stay sheltered as there is a second layer
of firewall securing the database server. By utilizing this technique, it will guarantee that data
won't get spill out from the organization. Just approved clients can associate into the database
server as they have the consent to access into the database server.

Moreover, another security technology which has been implemented in our company
website is login. Login is to make a computer system or network recognize you so that you can
begin a computer session. Most personal computers have no log-on procedure , you just turn the
machine on and begin working. For larger systems and networks, however, you usually need to
enter a username and password before the computer system will allow you to execute programs.
To view our company webpage more in details, customers need to sign up with a password for
the 1st time visit. Customers can use the username and password to login in our website to either
view or online purchasing. This is because, if the customers have their own password and
username, other third party cant misuse the customer username and password to excess the
website. This will ensure that the customers purchase details and other information is well
protected and difficult to trespass. In the other hand, customers should always connect from a
secured network to avoid connecting from networks with unknown or uncertain security
characteristics or from those with known poor security such as open wireless access points in
coffee shops. This is especially important whenever you must log in to the server or Web site for
administrative purposes or otherwise access secure resources. If you must access the Web site or
Web server when connected to an unsecured network, use a secure proxy so that your connection
to the secure resource comes from a proxy on a secured network.

5.0 Technologies Used


5 a) Software
14

First and far most, in order to create our website, our companys IT department use
software called Weebly. Weebly's free online website creator uses a simple widget-based site
builder that operates in the web browser. All the site elements are drag-and-drop and it
automatically generates a mobile version of each website. Storage is unlimited, but the service
restricts individual file sizes. Android and iPhone apps are available that allow users to monitor
their website traffic statistics, update blog posts and respond to comments, and add or update
products if the user has an e-commerce online store. Basic features for blogging and eCommerce are supported: site owners can develop simple stores with payments through
PayPal, Stripe or Authorize.net Users can choose to incorporate advertisements in their pages,
and visitor statistics can be tracked through an in-house tracking tool or Google Analytics.
Besides that, In order to keep our website safe from virus and other harmful cyber-attack,
our company has used Avira Antivirus software as a protection. Avira is the most safest and
popular antivirus software in the world. Our company has used 2 main products from Avira
which is Avira Ultimate protection suite and Avira Rescue system. Avira ultimate protection suite
consist of Internet security protection and PC maintenance tools. Avira rescue system is a set of
free tools that include a utility used to write a bootable CD which can be downloaded as
anEXE or ISO file. It has its own Linux-based operating system so it does not depend on the one
on the host PC. It can be used to clean an unbootable PC, and is able to find malware that uses
the host's operating system to hide. The tool contains the antivirus program and the virus
database current as of the time of download. It boots the machine into the antivirus program, then
scans for and removes malware, also restoring normal boot and operation. It is updated
frequently so that the most recent security updates are always available. Although all this cost a
big spending, our company decided to install Avira to ensure our webpage is safe from any kind
of cyber-attack.

5 b) Hardware
15

Hardware also plays an important role in managing our company website. Hardware is
hardware is the physical parts or components of a computer, such as the monitor, mouse,
keyboard, computer data storage, hard disk drive (HDD), graphic cards, sound cards, memory
(RAM), motherboard, and so on, all of which are tangible physical objects. Without any
hardware, your computer would not exist, and software could not be used. Hardware implies
permanence and invariability. Software or programming can easily be varied. You can put an
entirely new program in the hardware and make it create an entirely new experience for the user.
You can, however, change the modular configurations that most computers come with by adding
new adapters or cards that extend the computer's capabilities. Like software, hardware is a
collective term. Hardware includes not only the computer proper but also the cables, connectors,
power supply units, and peripheral devices such as the keyboard, mouse, audio speakers, and
printers.
Our company will have a server which is a computer program or a device that provides
functionality for other programs or devices, called "clients". This architecture is called the client
server model, and a single overall computation is distributed across multiple processes or
devices. .Our tart outlet will have a server room at the back of the outlet where the IT department
take care of the servers and other network operations. A server room is a room, usually airconditioned, devoted to the continuous operation of computer servers. An entire building or
station devoted to this purpose is a data centre. We will also have a Wi-Fi modem with high
speed internet connection. Customers who visit our outlet can enjoy our free internet connection
without any lack of speed. There will be also 4 computers in the server room where IT
department continuously manage all the cyber related works. All the 4 computers are installed
with upgraded hardware such as bigger storage hard disk, higher speed RAM and graphic card.

16

Conclusion
Information system managers oversee a wide variety of tasks related to information
systems, from directing or coordinating research to overseeing network security or Internet
operations. Information system managers are responsible for coordinating the computer-related
actions of the company. Because information systems mangers oversee a variety of other computerrelated jobs, they are expected to have a good deal of experience working in information
technology. Management information systems (MIS), which is an organized computer system that
gathers data from within and outside the company and processes it so it can be used by
management. The truth is MIS is a critical part of the management process and a key aspect of
quantitative management. Simply put, without data, we cannot manage effectively because all we
would be going on is our instincts and subjective observations. The data that MIS manages allows
us to look back in time, study the present or predict what might happen in the future by collect and
analyzing data. We will also know the important of having strong network and protections for our
devices, treats and solutions of cyber-attacks and also type of software and hardware that a
computer

needs

to

operate

normally.

Information technology strategy can only be a plan that is documented, that will assists IT
enable the business achieve its overall strategy. IT should be seen as a business enabler and not that
the business runs because of IT, therefore ITs focus needs to be meeting the business objects using
technology to enable the business to improve efficient and reduce cost. Generally the overarching
company strategy is linked to the company vision, IT needs to understand the vision and develop its
strategy so that is can enable the company to achieve those goals

17

Appendix
1. Location of the business.

2. Types of Tart

Fruits Tart

Salty Tart

18

Jam Tart

Raspberry Tart

3. Software used

Weebly
Avira Antivirus

19

Você também pode gostar