SPEEDMART99 SDN BHD
Felix Tanzil RobertsioChun Leng
SPEEDMART99 A Malaysian-based convenient store. It offers 3000 varieties of items within
200 stores. Near’n save is their slogan. They are a brick and mortar business
model.
Portal Five forces High or Low
Threat of entry
Bargaining power of supplier
Bargaining power of buyer
Threat of substitute
Threat of rivalry
Manual scanning (efficiency issue)
Warehousing Management
Manual scanning Time-consuming
Customer’s satisfaction decreases as well as Speedmart’s profit.
Warehouse management Check in and check out stock manually. Every 3 hour need to matching all the
products. Using a lot of paper or note record down the
information before key-in into system.
SOLUTION
QR 2D code. RFID (Radio Frequency Identification).
QR CODE QR 2D code is a matrix code which is free of
charge. It works in real-time performance. Steer clear queuing line in the real store. Speedmart99 is able to expand its business’s
range such as a virtual store in subway. Tesco’s new virtual stores in Korea have
increased registered users by 75% and online sales by 130% so obviously they have granted a big success according to Oxbow (2011).
RISK Of QR 2D code:
Instant action of spamming and destructive malwares from outsider which may harm customers.
Phishing of QR code. Some hackers attach a fake code and the customer’s data may be stolen away when they scan and key in their data.
SECURITY MEASURESOf QR 2D code: Speedmart99 may install a global anti-virus
within the building to protect any unknown data break through.
A small reminder of phishing crime.
RECOVERY PROCEDURESOf QR 2D code: Firewall, speedmart99 may apply double
protection which are anti-virus software and firewall as their security from unknow malwares.
RFIDRadio Frequency identification
A system using Radio frequency to transfer information between the tag and system
Bring effectiveness and efficiency
RFID TAGS AND READERS
RISK OF THE RFID Hard to change RFID suppliers The process of changing RFID is very huge. - each supplier using difference technology
to produce the RFID- Organisation need to purchase all the new tag and reader.
Organisation will suffer loss if keep changing the RFID supply.
SECURITY MEASURES OF RFID
Provide authorise access only those person who has login ID and
password can manage and control the system of RFID.
RECOVERY PROCEDURES OF RFID
Well document up all the RFID specification and Supplier specification.
Match all the specification with other suppliers choose the around 80%-90% matched.
THANK YOU FOR LISTENING