1. Strategic alignment of information security with business strategy to support organisational objective.
2.Risk management by executing appropriate measures to manage and mitigate risks and reduce potential impacts.
3. Resource management by utilising information security knowledge and infrastructure efficiently and effectively.
4. Performance measurement by measuring, monitoring and repo
information automatically gathered by mechanical devices such as a detector, beacon, probe car, and so on delivered from traffic-related organizations or a traffic locale system. It should also accept the function of gathering system that manually processes CCTV image information, reported data, and other information such as construction, accidents, or events.
The road network to manage traffic
Security design and implementation: Participants should incorporate security as an essential element of information systems and networks. Participants should focus on the design and adoption of safeguards and solutions to manage potential harm from identified threats and vulnerabilities.
Security management: Participants should adopt a comprehensive approach to security management. The approac
management, higher ratios of product rotation and less cost of sales management and operating cost
→ Higher competitiveness
C. Promotion strategy: Continuous leaflet advertisement, raising recognition, advertisement in the same sized format.
Original color of E-Mart, Yellow + Red =>unification effect
Execution of events: Chinese characteristics enjoying events
ɨ
event about which information must be kept; A record describes an entity
Attribute: A piece of information describing a particular entity
Key Field (Primary Key, Pointer or Index): Field in each record uniquely identifies this record for retrieval, updating, sorting
Definition: Organization’s electronic library stores & manages data in a convenient form
DBMS: Software to create & maintain