Font Size: a A A

Research On Design And Evaluation Of SPIC Company's Integrated Office System

Posted on:2019-07-17Degree:MasterType:Thesis
Country:ChinaCandidate:S NiuFull Text:PDF
GTID:2382330548470381Subject:Business Administration
Abstract/Summary:PDF Full Text Request
State power investment corporation(SPIC),which is in charge of the business,currently comes across two major problems relating to the current information system:first,business data is not effectively shared,transmitted or used,and second,the management procedures fail to be systemized.Furthermore,its information system is suffering the risks of information leakage,vicious attacks,and unauthorized visits.Therefore,it's the top importance for Nuclear Department to establish a completed,highly effective and safe information management system for SPIC and procurement.Based on the experience feedback from practical management procedure for SPIC and procurement,the thesis digs out and summaries the function requirements and end user requirements of an information system,and presents a design of integrated information system for SPIC and procurement.According to the logical relationship and management procedures in real word,the information system is divided into five functional modules,i.e.SPIC and procurement management,data recording,agenda,tasks and documents archives.Each module can be operated individually,and information and data can be mutually transmitted and shared by all modules.Detailed design for each module is presented,key points are analyzed,and the work flow and interface among modules are standardized,systemized,and simplified.As a result,this system is able to make a full use of all business data and information generated inside in a concise,clear and highly effective way.Besides design of business management functions,the thesis also provides an effective solution for information security by applying virtualization technology to realize the effective isolation of the confidential business information,setting up a complete scheme that includes the functions of terminal security management,document security management and user identification authorization management,thus only those who have legal identifications are allowed to visit the internal resources within their permitted authorization.The scheme successfully creates a new and complete plan for the runtime environment of business confidential information,and provides a guidance for network security construction,management and operating maintenance.
Keywords/Search Tags:Integrated management, Office system, IT Design
PDF Full Text Request
Related items