The business that this paper will focus on is a medium-sized food store in Atlanta. The food store will be used to store cereals which will be sold to other businesses. This will act as a supplier of foodstuffs to the surrounding restaurants. There is a need to have a good computer network that will enable the organization to get knowledge and gather information that will be required for effective operation. The design that the business will take is that of star topology. This is an effective topology as the various departments that will be developed within the organization will enable it to have segmentation within the organization. This topology has been chosen in regard to how the business will operate. The advantages of this technology include the fact that it can be changed anytime. When there is a problem in the network, it will be easier to manage and diagnose the fault.
In terms of architecture, the network will take the form of client server. This is where the server will host most of the functions. Most of the applications will be installed on the server so that the users will access them in the server. This is easier in terms of maintenance. It will be easier to set up the system. There will be no need to have a lot of expertise who will manage the system as the maintenance will only be limited to the server which has the required applications. For this reason, the organization will not need to install the other applications.
The security design of the system will be that of access restrictions. There will be access lists where the users will be allowed to access the applications and components that are important to the system. This will be achieved by making use of privileges where ordinary users will have limited privileges to the system. A security zone and user roles will have to be defined so that the users will understand what they are required to do. There will be the need to undertake the security policies and analysis so that the users will be involved in the security of the system. This will enable the users to be careful in the undertaking of security. Data integrity is an important process in any organization. I will ensure that the users are aware of the security measures that they should undertake.
The socio-technical linkages that will be used in the new organization are that of data mining. The knowledge that the users have will have to be put into use. The linkage here is that of making use of what the users have and the information from the clients. This information will be used to undertake knowledge creation. Explicit knowledge is the knowledge that is explicitly exposed in formal communication where it is easily transmitted among the individuals in both synchronous and asynchronous ways. On the other hand, tacit knowledge is the knowledge that is personal to an individual and cannot share or transmitted to another person.
One thing I would do with the knowledge management and to ensure that the network will tap on the knowledge is to ensure that there are proper knowledge management systems in place. There will be the use of data mining software like customer relationship management. This is the software which will ensure that there is enough data and views from the clients. This way, I will understand what the clients want.
References
Baskerville, R. (2008). Designing information systems security. New York: John Wiley and Sons.
Cole, E. (2011). Network security bible. New York: John Wiley and Sons.
Dhillon, G. (2005). Interpreting the management of information systems security. Computer and Security, 54(6), 65-76.
Harwood, M., Goncalves, M., & Pemble, M. (2010). Security Strategies in Web Applications and Social Networking. New York: Jones & Bartlett Publishers.
Lindup, K. (2006). The role of information security and corporate governance. Computers and Security, 54(15), 447-485.
Schneier, B. (2010). Secrets and lies: Digital security in a networked world. New York: John Wiley and Sons.