Next Article in Journal
An Intelligent Approach for Contact Pressure Optimization of PEM Fuel Cell Gas Diffusion Layers
Next Article in Special Issue
Content and Privacy Protection in JPEG Images by Reversible Visual Transformation
Previous Article in Journal
Development of a Prediction Model for Tractor Axle Torque during Tillage Operation
Previous Article in Special Issue
Enterprises’ Servitization in the First Decade—Retrospective Analysis of Back-End and Front-End Challenges
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Print Management System Model in a Large Organization

Department of Information Systems, Faculty of Management, Comenius University, Odbojárov 10, 81499 Bratislava, Slovakia
*
Author to whom correspondence should be addressed.
Appl. Sci. 2020, 10(12), 4193; https://doi.org/10.3390/app10124193
Submission received: 25 May 2020 / Revised: 16 June 2020 / Accepted: 17 June 2020 / Published: 18 June 2020
(This article belongs to the Special Issue Digital Transformation in Manufacturing Industry)

Abstract

:
This article is focused on the analysis and solution of the issue of a printing system model in a large organization. It provides an overview of the current stat29e of the organization and its current printing system. Based on the information about strengths and weaknesses, the most suitable solution for the given organization was designed and subsequently implemented. The created design meets all the requirements required by the company, while minimizing the threats that the deployment of the new system and the resulting changes may have. The work also describes various ways of dealing directly with change, whether when dealing with the old printing system or preparing employees for its change. The new system brings clear unification of the press, its monitoring and administration under the supervision of its own employees without the need for external companies or support.

1. Foreword

In large organizations with many employees, or with an increasing number of employees, it is difficult to keep the hardware level even for everyone. The problem should be approached with planning well in advance. However, if an organization finds itself in a situation where its current situation is unsustainable, action must be taken urgently. With increasing requests for a personal printer, it becomes necessary to create a solution that will not only satisfy employees, but will generally replace the original solution and bring new opportunities for the organization. This work discusses ways to change the current situation and what solutions are the best to minimize weaknesses and maintain print security for all employees.

2. Introduction

Information and telecommunications technologies are the fastest growing industry in the modern world. For companies that want to be competitive, it is essential to be interested in new technologies, whether it is a new software solution or a new hardware solution. New technologies bring efficiency to large companies in terms of saving money and simplifying work for individual employees and saving time that is wasted inefficiently. The technologies that surround us constantly increase over time.
Progress and technological advancement are essential in various sectors of society and in organizations around the world. Companies use various technological solutions to increase efficiency, productivity, and their privacy. Modern trends in cloud technologies and network solutions bring a certain comfort to employees. As a result, employees are more satisfied and can better devote themselves to their responsibilities. One such area is the press. Print management in a large organization is crucial. The printing of documents takes place in different areas, departments, or offices. Ensuring the printing needs of larger organizational units may not be a daunting task. Due to the degree of complexity of each organization, the solution is almost always different in each organization. Many aspects must be considered, such as the need for already implemented printing technology, compatibility with existing hardware, and many other factors. An important aspect is the need to ensure the correct access rights and to monitor printouts from a security perspective [1,2].
This work will focus on a company that has a problem with an unsustainable, old, and declining document printing system. The article is divided into three main parts.
The second section of the article is focused on defining the basic theoretical concepts that are necessary for this work and necessary to achieve the goal. From the composition and operation of computer networks, through selected network devices, we reach new, interesting solutions. Such solutions are not so often used in practice, but bring with them new possibilities that make work easier not only for employees, but can replace several small subtasks within the organization with one system. The section will also focus on the creation of analyses, projects, and their application, from the implementation of proposals into operation to the impact of these changes on employees.
The third section of the article describes the goals of the work and ways to achieve them. It turns out that by choosing the right methodology, it is possible to implement the individual steps and obtain the necessary information to develop this work.
The fourth section introduces the selected company, describes the current state, problems, and specifies the desired state. When designing a new solution, the printing model is analyzed, the current state of the organization, and the strengths and weaknesses of the company are identified. This data will then help to create a proposal that would be the most appropriate and would meet all the financial and time requirements that the company expects from the solution. The final state of the new system and a detailed description of the implementation in the selected company will be presented. On the basis of this proposal, a list of opportunities and threats posed by the new system has also been drawn up. Preparation of financial analysis and budget provides an overview of the price of the solution. The proposed schedule created using a Gantt chart will allow the project to start according to predetermined activities. Finally, the results, achievement of goals, and benefits of work are defined.

3. Critical Factors of a Successful Printing System Implementation in a Large Organization

In recent years there has been visible progress and an increase in interest in information and communication technologies. In particular, the creation of the Internet as a global network contributed to the high interest and rapid development of these technologies. In a rapidly evolving environment, home or classic local area networks are becoming increasingly outdated. Despite the fact that classic computer networks are being used less and less today, they are still the safest way to quickly transfer information. The increased investment in information and communication technologies, exchange and knowledge sharing are helping organizations to deal with the current global and dynamic environment. As much of the useful knowledge is outside company boundaries, these technological tools facilitate the collection of important data and information. Despite these areas, few studies have examined the role of ICT and important data within and between organizational links and the consequent effects on companies’ innovation performance [3].
An important aspect in the implementation of information and communication technologies is the emergence of various barriers. Common barriers include the presence of institutional pressures, and the lack of organizational and managerial coordination between different departments and functions that should be involved in the development of digital strategies and their integration in the strategic planning systems of organizations [4,5].

3.1. Computer Network

Computers connected to each other form a basic computer network. Thanks to such networks, individual computers can communicate with other computers. This communication is primarily used for data exchange and information sharing [6].
The first computer networks were created and used for the first time in the 1970s. Military and government organizations or universities built the first interconnections of the computers at that time to simplify communication and information sharing. The most important reason for creating networks was to share computer storage and connect them with printers. However, there were problems with the incompatibility of network protocols, as each manufacturer had its own type of network communicator (network card). After the introduction of the first Intel-based PCs (Personal Computers), the first local networks known as Ethernet, ARCnet (Attached Resource Computer NETwork), and others have begun to be built in large businesses based on data diversity and the need for collaborative search and information transfer [6].
According to the size of the networks we have:
-
PAN: Personal area network—as the name implies, it is a small personal network that usually serves only one person in small spaces to connect a computer to another device [7].
-
LAN: Local area network—a local computer network connecting unlimited number of computer stations and network devices with covering less geographic area (up to several kilometers). It can be a business connection and other offices or a direct connection of an organization with a data center, etc. [8].
-
WAN—Wide area network, a global, large area network throughout a continent. It is a connection between LAN and MAN, where MAN represents computer network covering up to several kilometers in large cities with high speed. WAN ultimately connects continents and the world. The best known type of WAN network is the Internet [9].
Since LANs are important for this work, the functionality of this network needs to be explained.

3.1.1. LAN

A local area network (LAN) consists of several interconnected elements. Active elements include a computer station or other network devices equipped with a network card. Next, one requires a router and a switch that receives processes and sends a signal over the network. Passive elements include hyphens through which the signal is transported or forwarded. It is the infrastructure and, therefore, the cabling itself and connectors that transmit the signal unchanged. The local network is mainly used in organizations, or even in the home, as these are only connections they do not need remote data transmission. It is a self-contained closed network. Organizational network security mainly includes network management measures and a set of rules for network security, network users, and devices. Here, the administrator ensures all the rules and policies for network accuracy and management [10,11].

3.1.2. Network Management

Many businesses and organizations have their own computer networks, which may be large, with many computers and other devices. When the network is large, it can have a complex network structure and, thus, complicate the redistribution of rights and other corrections. Employee access to the network has certain rules and, thus, the final possibilities of using the network. However, users must be logged on to at least one server. Here comes a series of solutions in the form of a large database, which can be viewed and mainly controlled by the network administrator. This database is located somewhere in the middle and when using Microsoft solutions and computers mostly under Windows, we will need a solution called Active Directory [12].
Here, the user must have a password-protected account to identify himself/herself. Individuals accesses their network and shared resources through their account, and if necessary, are assigned rights to work with them. Each user can have different permissions to different approaches or objects. The main division consists of dividing members into administrators and users. The difference is only in the number of assigned rights and options assigning or withdrawing these rights. The administrator’s task is to create new users, modify their member groups and, thus, their rights in the network. Users can have the same rights. There is no need to assign a specific list of rules to everyone. It is easier to create certain user groups where individual users will join and inherit pre-selected permissions. It is faster and clearer and, thus, more reliable and secure. For such complicated management of network users and its configuration uses a system called Active Directory [13].
Active Directory is used to organize network resources into a tree structure and the setting of the global system policy. The internal network structure creates the so-called company domain, which is essentially a group of computers with a common directory database [12].

3.1.3. Internet Connection

If a classic LAN network is already created, it means the built internal infrastructure network of a particular domain, and it is necessary to prepare it and then connect to the Internet. The advantage of building the internal infrastructure is increased security against external penetration. With classical LAN or WAN (in an environment that has several separate buildings/offices, etc.), it is possible to explain and display the network topology (Figure 1).
The basic part is the built LAN network. This is the internal infrastructure organization. The heart of the network is the server room, which has its own firewall and router. This connection is connected to each device using switches and passive elements network. The second important part is the DMZ (demilitarized zone), which is used to increase security against attacks. WAN represents the environment in which one can have multiple LAN networks. This mainly includes other environments (buildings/offices, etc.), which must be in direct connection with the first LAN. Basically we have connected multiple objects under one common network. This second LAN has a separate network server room with a router and firewall. In the picture we can see that direct entry into the external environment (outside the LAN and WAN) is through the main point of the server room (primary network). The server room has the role of a gateway between the external and internal environments’ networks. Sometimes, multiple layers of firewalls provide protection, not only of the internal network from attacks, but also from unwanted information leaks from building. The firewall automatically scans and prevents further transmission of the passing information in the event of a suspected threat. The threats identified are sent for analysis to network administrators for review [14].

3.2. Network Devices

Network devices are all devices connected to computer networks that are connected, either directly to each other or that receive and send data over a computer network. However, the work will not analyze the various types of network devices and their elements to maintain an uninterruptible network, such as a router, switch, hub, repeater, and the like. In this work it is important to define the connection between the user’s computer and the end printer.
The difference between a local printer and a network printer is that the local printer must be connected directly to one’s computer. It is mostly connected by a USB (Universal Serial Bus) cable within a few meters. This is the first disadvantage. The second difference is that, since it is connected locally, only one user can be connected to it. Therefore, local printers are mainly used in homes or startups where the printer is connected to a computer, which prints, for example, invoices. Unlike network printers, they are often smaller and cheaper. It is assumed that these printers are used only occasionally, and, thus, relatively little. Therefore, network printers are preferred for frequent use, operating as medium- to large-sized companies that print in bulk. Regardless, the size of the printer is the main difference, and that the network printer is equipped with a network printer card, so it can be connected to the network. After you configure the printer, it obtains a fixed IP address (a series of numbers that identify each device on the network). With computers and other devices the IP address is assigned automatically by the DHCP (Dynamic Host Configuration Protocol) server (a boot method controls how the machine obtains an IP (Internet Protocol) address/RARP—Reverse Address Resolution Protocol/APIPA—Automatic Private IP Addressing server), so there is no need to assign addresses to computers [15].
However, for printers it is important to set a fixed address because we must know the address when connecting to the printer from the user’s computer [16].
The installation of such a printer depends on the manufacturer or the complexity of the printer. Usually simple printers, whether local or network, install themselves when connected to a PC (Personal Computer). More complicated machines (printers with extended functions) require printer drivers to be installed for each computer separately. There may be a problem if the company uses several types of printers that are not compatible.

3.2.1. New Network Printing Options

Based on the mentioned facts about network printers, there are new possibilities which facilitate printing in large companies with large numbers of employees. New print options provide more than just saved time when installing new drivers. These systems remove both the printer administrator and the user and all other small ones work around printers. The easiest solution for companies that do not have technical background or necessary staff is the solution of the complete rental of printer services [17].

Rental of Printers

Several providers offer businesses rental equipment and services to help especially for start-ups that do not have enough capital but need to maintain a certain standard. The services provided include outsourcing of IT (Information Technology) services, which include care for complete company infrastructure, networks, servers, or even end devices. Companies who have the know-how but do not have the necessary capital to buy all the equipment can simply rent. However, from rental services, such as web services and email solutions, security is, for some companies, the most interesting product rental network printers. The company leases the necessary number of printers and provides the supplier everything from the first installation to the necessary printer service and replacement of consumable goods. However, the price depends on the provider, the number of printers, and the number printed pages [18].
Among other forms than renting the entire solution is the possibility to extend the current situation to new systems that can manage printers, but system management remains on the company level. The name of such a solution is not precisely defined, and different companies and providers do not give an exact name, but the closest would be the name “multifunctional printing solution”. All providers basically offer similar products. The final product differs mainly in price, options of other services, or specific printer interfaces. For the needs of the selected company based on the kind of equipment used, the most suitable applicable system is MyQ [19].

3.2.2. MyQ and Organized Printing Solutions

MyQ is software oriented for organizations with a large number of printers or with a complicated printing structure. The system provides complete control and monitoring of printing in organizations. This makes printing easier and, since it is monitored, it can also generate accounting or other print job data. It offers companies a comprehensive solution, which brings not only an overview and reduced printing costs, but also a revolutionary system printing security. Thanks to user administration it speeds up and facilitates the realization of all printing requirements of employees of the organization. The system basis is the database containing information about users and all printing devices. Based on this information, the system identifies individual users and allowed devices to print. It also monitors the amount of printing not only on devices, but also to a specific person. Users are identified by logging into terminals directly on the printer using an assigned PIN (personal identification number) or chip card. Each user is assigned access to the system via the Internet browser, so you can control your own printing costs or manage your ready printable materials. They are generated accurately for the system administrator or department heads’ statistics on the volume of printing of individual employees. Such a printing solution can be used for both small and large enterprises with a large organizational structure [19].

3.3. Deploying New Systems from the Organization

When changing existing systems, it is necessary to best define the old system and find suitable ways to design a new one and to move from one system to the next. Therefore, the first step will be to create an analysis that defines the current state from which it will then continue to select the best solution. When deploying new systems, a number of new problems need to be overcome and solved. One of the problems may be the impact of the new system on employees. Employees may have a negative attitude towards a new solution for several reasons. It is very important how they are notified of the change and transition to the new system and present the benefits not only to the company but also themselves [20].

3.3.1. Creating Analyses

SWOT analysis is one of the basic analysis tools and is for this project most appropriate because of the evaluation of the current situation from several points of view. It is necessary to define the strengths and weaknesses of the organization and, hence, the subsequent opportunities and threats that can meet the organization. The SWOT analysis outlines various alternatives to future states or taking advantage of the benefits it can bring. SWOT analysis is a combination of analyzes O–T and S–W, where O–T is an opportunity-oriented external (external) analysis and threats, and S–W represents an internal (internal) analysis defining strengths and weaknesses [21]. The aim of the SWOT analysis is to assess the internal assumptions of the enterprise when making a change or business plan. These results show the organization’s current status and help it focus only on opportunities that match the benefits and avoid the threats against which it is unable to defend. However, if these threats present unavoidable problems, we can, through analysis, take certain steps that can minimize or completely solve the problem. The resulting strategy should constitute a fundamental recommendation for the strategic organization and its orientation to balance the level between internal capabilities and its environment [22].

3.3.2. Creating New Projects

Certain procedures are required to apply certain changes or specific implementations of new solutions to an organization. In essence, it is a transition from old to new. Since this transition requires some tools for change, it is good to create a project that will help define the exact procedures for switching from the initial state to the target (desired) state. The project is one-time demanding a task that must have a temporary duration (deadline) must have a defined purpose (goal or outcome), start and end, and resources allocated (human, financial 18a other). One of the basic features of the project is that the task is complex and must be meaningful. To solve tasks we have predefined conditions for the use of resources, whether financial or time (deadline). By more complex tasks we understand the main task, divided between several specialized sections, and the division into several smaller partial tasks. The principle of the whole project is from the initial state to achieve the desired final state in the parameters determined by the cost in the required time [23].
The best way to report the current status of project implementation is through documents, which should be comprehensively but concisely elaborated and should show the fulfillment of the activity in terms of time, cost, and quality. The best results in monitoring the current status are achieved by comparing the current status with the planning status. This can be achieved by visual aids, such as a project event graph. Among other things, interdependent activities can be encountered when creating processes, without which the next steps of the project cannot be continued. It is, therefore, important to plan individual processes with certain reserves. Individual processes transform specific inputs to required outputs [24].

Gantt Chart

Visualization of project planning has an important position in project management. The task of the diagrams is to clearly display a large volume of information in a simple and easy-to-understand form. The Gantt chart is graphical View activity information and I am bound to them by the term along with the length of time and project phases. It is a central tool for visualizing the entire project. The Gantt chart consists of a horizontal line consisting of a timeline (maybe days, weeks, months, but also years) and a vertical axis showing a list of activities necessary for the implementation of the project. In the graph it is possible to draw defined, already mentioned milestones or important completion times of certain phases or mutual relations of these objects.
It is also known other kinds of useful network diagrams such as CPM (Critical Path Method) or PERT (Program Evaluation Review Technique), which allow to look for alternatives, analyze the statistical information, or point out a critical path. However, these kinds of graphs are often confusing or difficult to understand for other participants, which is their great disadvantage. Therefore, they are rarely used in smaller projects. Among the basic rules for creating network [25].
On completion of the project, it is necessary to verify that all activities that have been planned have been completed. Furthermore, it is necessary to prepare project documentation and final reports. The final evaluation checks the correctness of the implemented parts of the project, its outcome, fulfillment of the client’s requirements, and checking compliance with the limits. After the evaluation, a final report shall be drawn up, which shall include a complete process and the results of the project implementation. This report is submitted to the sponsor.
After all the links between the project and other stakeholders have been completed the parties evaluate the work of the project team and evaluate the staff. After these points is the subsequent dissolution of the project team (the staff who actively worked on the project) [26].

3.4. Impact of Changes on Employees of the Organization

As mentioned in the changes to the system, it is necessary to assume a negative attitude on the part of employees. Employees are the most common ones to switch to the new system. Scientific discipline dealing with employee changes in behavior is called organizational behavior. Organizational behavior is an approach to the management of people in the work process. Its goal is to study the behavior of people, and on the basis of acquired knowledge it improves both theoretical and application aspects of the approach to people management. Subjects of such research are individuals, groups, organizational processes, but also organizational dynamics [27].
Changes are necessary for some organizations because of external environmental changes and organizations’ adaptation to these changes. To survive, they must adapt. Organizational change, although it may be small, is related to the formation of a new organizational culture or organizational design. Such changes, whether related to external change factors, such as competition, new technologies, or customer adaptation, are changes that are classified as external incentives. These forces have a large impact on the organization because they are often unplanned. This means that the organization can anticipate and respond to them, but it cannot change them. When developing technologies, it is also necessary to focus on the fact that the development and use of computer technology is nowadays several times faster and larger than in the previous period. When implementing new technologies, the view that new information systems are a modern competitive advantage, it is essential to involve both young and old employees in these advances. It is an innovation, not an automation. Internal incentives include identifiers of unwanted sleeping (productivity meaning) in an organization. It can be a drop in productivity, a change of opinion or a dissatisfaction to a negative attitude of employees. Such factors also mean a change in the culture of organizations. To minimize the risks involved, it is necessary to define the vision of the future. Equally important is the description of how to achieve the objectives, which should be simple, but sufficiently understandable and flexible. In order to achieve the objectives successfully, it is important to create political support for change. The proposed change must be approved and supported by the top management or other stakeholders before it is implemented. It must also be flexible enough for possible changes to proposals by management, but also for forced changes in implementation problems. As already defined in the planning and implementation of the project, constant monitoring, evaluation, and control is required and, hence, the necessary adaptation for the success of the project [26].
Changes and their impact often have a negative effect on people. Changes are mostly associated with job loss, confidence, high stress, anger, or other worries at work or privacy. It is very important for changes in organizations to be a responsible person or the manager was able to rebut their fears and eliminate doubts. Change management is a complex system of individual activities and relationships, not the individual steps taken. Every person is unique in their abilities and knowledge, therefore, it is very inappropriate to make changes when people generalize and have created only one system/procedure for making changes. Principles of pressure and tension [16] claim that people in tension are not, in principle, against change if they have a positive impact for them. Under the principle of pressure, the theory claims that people think rationally and are self-driven. Therefore, it is important to the organization and management that the interests of the company are reconciled with those of the employees [27].
When confronted with great resistance to change it is necessary to realize that while change behavior is a relatively quick process, it does not necessarily mean a change in attitudes and opinions. Opinion change is a complicated process that often requires sufficient time and patience. If we think why people are fighting against change, we can conclude that change means, first and foremost, to change ourselves. It is a change in the established way of working or its style of execution. Here it comes from fear and uncertainty about the violation of habits and the balance of activity. Feedback is the only prevailing solution on how to manage resistance to change. It is this feedback that can be used to drive and, thus, overcome resistance given change. The first important step is to expect such resistance. People have a need to control things and this need can only be met by letting people directly determine the sequence of events. We basically involve them in the change planning process or procedures for making these changes. The second factor is communication. When successful it is important to let employees know what changes are being prepared and what it has changed for them. With this step, we give them room to create first expectations and first resistances. We must not forget that it is also important for the management to prepare for the resistance mentioned in the first point. The third and last important factor is empathy and support. This applies in particular to members of the organization most strongly affected by the change. Here comes the important task of management. Additionally, in these cases it is important to identify the source of the fear of change and to use it as feedback. There is a need to create a communication channel and have sufficient communication skills, which are very important in any change [27].
There are several forms of resistance to change and forms of resistance. The most frequent occurrence is the loss of interest in work. Such a person mentally dissociates themself from the change as if it did not concern them at all. Such workers are physically in the workplace, but they are mentally and thoughtfully different. Often, they reject the problem and do not respond to it. It is important to confront such a resistance response and let the employee speak their opinion. Subsequently, over time and discussion problem minimize or provide opportunities to overcome the problem, and, thus, change your mind employee. We can also encounter reactions like anger, which we call negation. Such employees compare the previous situation with the new one and reject the change based on the idea that if it worked like this so far, why change it. In such cases, the importance of communicating is significant, as is a rationale based on facts, not emotions. We can also face disorientation, causing confusion for employees. These employees try to solve the problem of what to do instead of solving how to do it. They may ask questions about the details. This reaction is common for employees who are used to clear objectives and task-setting. In such cases, it is important that managers clarify the change and define the priorities and sequences of new steps directly affected by the change [27].
Summary of the chapter can identify six basic tactics to deal with resistance to changes and overcoming employee barriers in organizations:
  • Education and communication—resistance can be reduced by communication between management and employees.
  • Participation and engagement—involving participants to process we minimize resistance and gain new knowledge and information on change.
  • Facilitation and support—we can engage employees with higher levels of fear to various trainings or therapies that can overcome the fear of change.
  • Negotiation and agreement—if the previous points fail, we know the stronger individual convinces individuals by agreement or special reward can contribute to reduce resistance to change.
  • Manipulation and cooptation—biasing and concealing information aims at making more acceptable changes, and, thus, faster adaptation from employees, even at the cost of providing misleading information.
  • Force coercion—these are direct threats or forces to change. These may be threats of relocation, loss of procedure and rewards, and negative rating or recommendation.
Any change in an organization that directly or indirectly affects employees should keep in mind that people do not like change. For them, change represents uncertainty and the breaking of the established stereotype. It is up to the organization and its management to consider the risks and opportunities that change will bring, because only those who are looking for new opportunities at some risk can take advantage of the opportunity and succeed [27].

3.5. Information Security

Personal data is sensitive information that is used to identify individuals and such data it is only possible to work with their consent. Everyone has the right to protect this data from tampering with their private or family life. Additionally, people have the right to protection against the collection and subsequent publication of such data [28].
At present there is also the potential possibility of this information being compromised, either directly or through an attack on a technical device or the environment in which the information is processed, called a threat. There are a number of factors that can jeopardize or cause information and communication technologies to malfunction and devalue the information they process. These are, for example, natural influences, technical failures, human errors and omissions, malicious software, targeted attacks, cybercrime, and international terrorism, which could cause serious security problems [11].
For this reason the GDPR—General Data Protection Regulation—was introduced. The main objective of this regulation is the protection of personal data in the area of fundamental human rights and freedoms. It is regulated by Act 122/2013 Coll.—known as the Personal Data Protection Act. Today, the new regulation is known as the GDPR (General Data Protection Regulation), which is above the Slovak Constitutional Act from 25.5.2018. GDPR is a comprehensive package of EU data protection rules [29].
Personal data protection represents an issue which began to be dealt with in the context of religious conflicts and came to the fore after the Second World War when possible negative consequences of the misuse of personal data were made visible. Personal data protection is currently mentioned in relation with the implementation of General Data Protection Regulation (GDPR) by EU member countries [30].
The law applies to all institutions that process and collect personal data. These are mainly state administration, territorial self-government, public authorities, legal entities, and individuals [31].
One option that can help organize information security are standards. Security standards can be used as guideline or framework to develop and maintain an adequate information security management system (ISMS). The standards ISO/IEC 27000, 27001, and 27002 are international standards that are receiving growing recognition and adoption [32].

4. Aim and Methodology of Work

The main aim of the work is to create a new printing management model in a large company and then apply it to real operation. Side goals are to analyze the current state and define strengths and weaknesses for organizations. After the design of the new model is created, the procedure for its implementation is defined and the process will be determined. Another sub-objective is to propose the transition of the old system to the new system and define possible opportunities and threats from both the system and the staff involved. Finally, the secondary objectives are to create a financial analysis and a timetable for the implementation of these changes.

4.1. Methods

To successfully achieve the objectives, it is necessary to analyze the environment of the organization, namely, defining its current status and specifying specific problems. Since the organization did not want to be named, we will approach the problem in general, and so it can be applied to another organization with similar characteristics and ultimate problems. Using the theory described in the first section and analyzing the current state, the appropriate solution to help the company achieve an improvement in the printing system and creating secure printing for all employees in the organization will be chosen.

4.2. Choice of Methodology

In order to be able to work out individual goals successfully, it is necessary to analyze the current situation and define under what conditions the problem can be solved and whether it is a benefit or burden. To solve the problem, a semi-structured direct interview form will be undertaken, in a personal meeting. Since the problem is the insufficiently secured print process for all employees, we will contact the director of the technical department of the organization directly, being provided the basic information about the problem and the organization. Other detailed questions were directed to the technicians of the organization. Names or other information not directly related to the problem will not be disclosed.
The first part is directed at the description of the organization and its current status, established during the description of the printer space and layout. Furthermore, information on the number and types of printers and their functionalities and possibilities of involvement will be obtained. The last part of the interview detailed naming the desired state, which is described in the discussion section, thus, expressing what the company expects and what are its conditions. They have already replied to the analysis of the current situation with specific technical staff of the organization who defined the most serious problems and provided data and records of current printers and their use. Through conversations the necessary data that were used in the design of the new solution and in the definition section “before” and “after” status will be obtained. All this data was used for the final design of a suitable solution, which corresponds to the desired state of the organization.
Based on the analysis and problem definition, a solution will be proposed that will be carried out by searching for and conducting market research (Internet searches for specific solution providers). After addressing and selecting the most appropriate solution, a list of opportunities and threats to be considered when implementing new systems into the organization will also been compiled.
Financial analysis was performed by addressing suitable and potential vendors via email and telephone communications (but are not part of this work). We chose one based on the most suitable conditions: a business whose offer will be used as an example. Implementation of the new system was already in place at the headquarters of the organization on the agreed date with the cooperation between the supplier and the technical department of the organization.
All work data was obtained through observation and design experiments and implementation procedures for the organization that will be worked into the final design and evaluation of the most appropriate solution for the organization.

5. Results of This Work

This section will introduce the organization in which the analysis and implementation of the new printing system will be performed. By precisely defining the problem, asking for a solution to the problems and formulating the desired state, it was possible to present the first suggestions that would solve the problems.
The first issue was to evaluate the current state and collect strong and weak organization pages. After defining these pages, it will be possible to create the initial design solutions for which a suitable provider will be sought. After addressing potential providers based on the submitted offers, a financial budget for a specific solution will be prepared. After the budget was approved by the organization, the first phase of the solution will be launched in cooperation with the company, and a model solution will be implemented. After implementation, a test group was created, in order to test the solution after it had been in operation for a certain period of time. After the tests of the solution, it will be possible to define the new state of the organization and, thus, create new opportunities and threats related to the adoption of the new system.

5.1. Description of the Organization

The organization in which the solution will be applied wished to be unnamed or otherwise mentioned. However, the solution is more or less universal for other companies with the same problem. It can be said that the company belongs among the larger companies operating in Slovakia with several smaller branches throughout the territory. The company is engaged in legal and international activities and is dominated by a lineage (hierarchical) organizational structure. The main building employs approximately 400 employees, each working mostly on a computer and needing access to a printer. The building consists of five floors and four main corridors that connect in an “O” shape. On each floor, offices are divided into cells, themselves 12–36 square meters. The distribution of employees depends on their functions. Directors have separate offices to which the relevant secretariat is assigned. Then there are offices occupied with 1–4 employees, or more. The organization comprises several sections, which are further divided into departments. Each of these departments has a dedicated independent activity, but cooperates upwards within the section. There are also four separate branches of the company in the same city, all belonging to one organizational structure.
The layout of the company is important from the perspective of employees’ access to printers for the reason of maintaining the security of personal data, or other reasons (confidentiality of sensitive data, etc.). Therefore, it is also important for the employee to have a printer as close as possible and larger; remote printers are not satisfactory.
However, the most important problem is the large number of printed pages. For this reason, the company has purchased a number of printers over the years, as well as other copying machines of different kinds. Maintaining and managing them is demands significant resources for the organization. Due to the poorly structured arrangement and planning of the purchase of these machines, there are many types of printers and, thus, many types of consumables that are not compatible. This means that the company has to order individual consumables for each type of printer material, toners, but also other materials, such as image drums, belt units, fusers or waste containers. Frequent repairs are necessary supplying the warehouse, which is very demanding in terms of time and money.
Small printers are cheaper, but materials like toner and other consumables make it more expensive to print more pages than with larger, more modern machines (Table 1).
Table 1 lists two printers from each of the most commonly used printers in organizations. Toner prices were obtained from the average price from various retailers (via heureka.sk). To make the price as accurate as possible, the original toner black (base) with the specified number of pages printed manufacturer is used for each printer.
When calculating, it is possible see that the price of toner for small printers is, proportionally, significantly larger for printed pages than for large-volume machines. The most common small local printer price per printed page after rounding is 0.07€. The price of a large network printer per printed page is 0.002€. If one divided these two amounts by the result, we see that printing on a small printer is 35 times more expensive.
The company also has newer and more environmentally friendly equipment, but not every employee has access to them. Managing a large device and restoring consumables is easy. With network printing, the printer can be used by almost everyone who has access to it. As with small printers, damage often occurs by unprofessional staff intervention and technical assistance is only called when the printer is in particularly poor condition. In such cases, even if it is just a paper jam, it is recommended to call technical assistance. However, with many printers, there is a wait time for action, and the time delay and the need for the employee to print becomes very unsatisfactory.
Despite the era of digital media and mobile devices, the business is inevitably reliant on paper-based processes. These are mainly contracts, invoices received requests, letters, and many other documents received or sent for approval or correspondence.

5.1.1. Technical Support

The organization’s helpdesk is responsible for ensuring the operation of the organization’s printers. The helpdesk takes care of corporate problems from both an administrative and technical side. The printing system is in the technical category. Management of printing machines, maintenance, and restoration of consumables is recorded and managed by the Technical Department helpdesk. The internal technicians are responsible for ensuring that the organization runs smoothly. One of their tasks is caring for printers. Since its in closed, non-public areas where the printers are located they cannot be maintained externally in the form of a careful service. This is also true for large network printers in corridors and secretariats. Technicians accept requests from employees and resolve problems or requests to replace consumables. Any interventions (except paper refilling) equipment and printers are prohibited by employees. In the absence of technical workers in the workplace, the situation was unmanageable. This is why the company decided to take action and phase out small, inefficient printers from their assets.

5.1.2. Required Company Status

The company would need to prepare a complete analysis of the state and design of a new solution, which would solve all the problems at once. The targeted state of the company is to abandon the current complicated system and solve its already mentioned problems. The new system should be able to cover a large burst of press for all employees with coverage throughout the building without walking post-printed materials too far. The new system is not only about software but also about purchasing new equipment needed to implement the new design. The system should be easy to operate for both the employee and internal technical support.
Likewise, the system should have a backup solution, and in the event of major problems it must be easily repairable or replaced. It is also necessary to solve the security of printing, which is a significant problem in the current social system. Managing the new system’s hardware issues must be made available for internal technical support because the premises of the building are inaccessible to the public and waiting times for the securing business are too long. For the same reason, it is not acceptable to design services that uses an external company to provide printer rental and maintenance. The solution and transition to the new system is required as quickly as possible. The transition to the solution shall not exceed 30 working days.

5.2. Analysis of the Current State and Proposal of a New Solution

To analyze the status and design of the solution, it is necessary to recapitulate the main problems that the firm desires to remove with the new solution. The biggest problem is the chaotic structure of the press, improper placement of printers, variations and quantity is relatively difficult to maintain. Furthermore, print access is not guaranteed evenly for everyone, printers are not secured against theft of printed materials, and there is no condition and balance monitoring system.
The solution to the problem of the organization is to propose a new system layout of devices and consider renewal, or adopt a new, more modern system, i.e., apply a new information management system and monitor printing on all devices. However, for a detailed proposal, a complete analysis of the current situation is required.

5.2.1. Current Situation Analysis

Based on observations and data obtained in cooperation with the technical department of the company, it is necessary to process the necessary information into a SWOT analysis on the basis of the evaluation of the current state of the organization.
Already at the beginning of processing the current state it is possible to determine that the main problem is an outdated print structure that is unreliable and opaque. Complete assembly of the machines used to consist mainly of locally-connected printers located directly in the employees’ offices. Locally means the printer is connected using a USB cable directly to the computer, limiting printing to just one computer. This type represents approximately 70% of the printers used. It is also the most widespread, and this is mainly due to the many requests from employees for a personal printer and a refusal attitude of workers to give up the printer. There are more than 27 different types and brands of printer in this organization. Each type requires a different type of toner and others consumables. Another common problem with small printers is the unprofessional intervention by employees who have a paper jam or other error that has caused a printing stoppage. If the paper is jammed, one must be sure to open the printer carefully and follow precisely the specified steps by the manufacturer, pulling the paper in one piece. When the paper is torn inside the printer, the printer must be opened and cleaned gradually. If the printer shows any remaining dirt, it is inoperative. This means that the problem cannot be solved on-site and one needs to remove the printer and replace it with a new one be added to spare network printers nearby.
The second type is a network printer. This printer is set up so that, when connected, it obtains its own network IP address, making it available to anyone connected to that network. However, this does not mean that any employee can use it. Firstly, someone from the technical department must set up the printer on a specific computer and install the necessary drivers so that a computer can communicate with and send to the printer documents required for printing. The employee does not have the necessary knowledge and administrative rights for such an installation. For new employees, or when relocating an employee inside the building and connecting to another printer, or if the printer is unavailable, technicians install a new/different printer locally on every single computer. The advantage of a network printer is that it can be located anywhere when it is connected to a network. This type of printer is located mainly in corridors, secretariats, or larger offices. Network printers can be small or large, and provide scanning, sorting, stapling, and other functions. Another advantage of multifunction network printers is the possibility to send scanned materials directly to the employee’s mail. It does not require a storage device or manual setting. One simply chooses an address or addressee, selects their name from the list, and sends the scanned documents directly to mail.
However, the share of network printers is only 30%. That is, the network layout of the printers is very important, and since there are not many and the office space is very large, there are areas where no printer is available. This is a problem for the workers that have network printers (that is, they have the printer installed), but they must go to other parts of the building or to another floor to retrieve printed materials. The specification of the number and type of network printers is shown in Table 2.
According to Table 2, the organization has 89 printers. The division consists of 62 local printers of 27 types, and 27 network printers of seven types. The ratio between local and network printers is 70/30. The number of types means different types of printers of the same category that do not use the same consumables. For each type one needs to provide unique supplies that are not compatible with other printer types.
However, the main problem of downstream printers is not their localization or unavailability, but the printing system. The system prints on ordinary printers as soon as it receives a file, prints the documents, and must be picked up in person. During the normal day it often happens that several people print documents independently at the same time, and they need to be sorted after printing. It often happens that someone accidentally takes the documents of another, who then looks in vain for their printed materials. There is a great risk of losing materials, compromising personal data, or to the security of classified information. In such situations, many personal requests arise with respect to the printers, and the condition is getting worse [5].

5.2.2. Breakdown and Recap of Strengths and Weaknesses

Based on the current information on the state of the company problem it is possible define the basic strengths and weaknesses of the company. The strengths of the company include, firstly, a functional printing system. This means that even if the system is not perfect, it is functional and, as such, it manages the current onslaught of printing traffic. Another strength is that there is sufficient good hardware within the company. There are enough quality printers that cover a large amount of usage, and, thus, a number of print jobs. Another important strength is the qualified professional help desk. These employees are also proficient in the onslaught of tasks. The company is free of use external companies to ensure operation or provide solutions to more complex problems. This is very important because the new system can be designed with the ultimate goal of being managed by company technicians and not by an external company—that is, the system vendor [33,34].
One of the weaknesses is the outdated print structure. It is a chaotic structure of different printers that are not compatible with each other and cannot work with multiple computers. In most cases they only cooperate with, at maximum, one computer. The second major problem is the mood of printers.
The lack of central network printers represents the blind spot where printers are not located. Therefore, small printers are needed, which, over time, have covered areas where no printers were before. This solution caused the purchase of small cheap printers which are expensive to maintain and do not have a controllable system of printed pages, as well as disorders. Such maintenance is relatively expensive and, compared to the new large network printers, is several times more expensive than modern printing technology. Many small inexpensive printers are not only expensive to run on supplies, but are also unreliable. Small printers are not adapted to a business where the printer is printing on a daily basis. Frequent use also requires regular maintenance that requires additional funding and technical support time. The most serious problem is not to use network printers that may result in information leakage or violate the GDPR. It is not possible to secure a network printer to prevent theft of printed material by another person. Such alienation of printed pages may also be purely random when multiple people print at the same time. Another disadvantage that has already been mentioned is that of printing monitoring. Small local printers cannot be monitored for the number printed pages and it is not possible to determine whether an employee is printing a number of authorized documents or printing for their own needs. The last weakness is the fear of change, although this is basically a risk when deploying any new system.
By defining strengths and weaknesses it is possible to evaluate the current situation, i.e., the current state of the organization by the printing system and the press in use. Detailed strengths and weaknesses are listed in Table 3.

5.2.3. Creating a Proposal

In order to create a proposal it is necessary take into account the current status and requirements of the company. The design of the solution consists of creating a central network printing solution to manage overall organization-wide printing, including designing a user-friendly application with a notification system in the event of a problem or the need for intervention by a technician.
The solution consists of a print server that will be the center of all printed jobs. The essence of the system is to identify the job and send it to the desired place to print from. However, to create secure printing printers will be protected by security features, that is, printers will require user security identification. The most commonly used are PIN (digital) codes or smart cards. After identifying and authenticating the user directly to the printer that prints the job, it is created and sent to the system, and the print server sends the data to its present printer, which then prints the materials, already in the presence of the author.
Such a system must be deployed internally within the network infrastructure. After deployment, the system will be configured and, along with others necessary hardware (printers), access to the administrative part will be handed over to technical support.
Application settings will be made according to the requirements of the organization. The application will include a complete system report, providing a complete overview of all connected printers, their current status, and the status of users’ print jobs.
Users will be added to the system through synchronization with, for example, Active Directory, i.e., when an employee account is created or disabled, the account is activated or deactivated. By setting up, internal technicians will be able to define security features for logged-on users. The generated PIN will be delivered to the user via email directly from the system after creating an employee account. In case of a lost PIN, it can be re-generated.
The application will also include a power consumption notification system, warning a predetermined person (technical support) of the status of the device, such as a paper jam, device damage/error, or a current alert level of consumables. Such notifications can be sent directly to the helpdesk employee responsible to solve the problem. No communication from the employee is required towards the helpdesk. This system also prevents damage caused by the intervention of employees in order to (unprofessionally) repair the printer.
In the second part of the new solution it is necessary to work out which printers are suitable or, rather, if they are compatible with the implementation of the new solution. Since it is a networked printer, we can assume that local USB printers are not compatible. The new system can only be downloaded to printers that have: network access, touch display, numeric keypad, smart card reader, or other form of security.
According to the table, only 15 downloadable printer drivers are compatible with new system. These are the latest and most powerful printers that have been most recently purchased. From the ratio table it is known that the new system will be subject to 17% of all printers.
When designing a new layout, it is possible use data on the company building. According to such information, the building consists of five floors and four main corridors no more than 50 meters in length on each floor. That is, reflects a space of 20 corridor sections (5 × 4) and if the printer placed in the center of the hall, each employee will have a printer at a maximum distance of 25 m from the office, which is acceptable. This means that, for 400 employees, in an even distribution 20 devices are needed. Recommended hardware is a classic multifunction printer with an easy-to-use display with PIN input and chip reader cards. It will be suggested that the firm purchases the same printer type for easy management and compatibility of consumables. The minimum sufficient solution requires five devices with new system support.
Thanks to the new layout of printers with the printing system, this covers the complex area of the corridors of the building. This means that regardless of the section or the employee, one can use any printer in the building. However, there are still other printers that do not support this system. In the next section the proposal to deal with the current (old) system is discussed in detail.

5.2.4. Switching to the New System (Old System Solution)

The greatest advantage is the routing of the entire area of corridors and secretariats. This system also solves the possibility of equipment failure, because the employee (in case of device shutdown) has the option to go to another nearby printer and print the material right there. The print server sends jobs to the printer only after it has identified the employee, regardless of their location. That is, even in the event of long-term failure it is possible to replace the device with another (replacement or new) and there is no need for intervention by technicians in the form of installing a new printer or configuring a new IP address for the device.
The old solution is completely replaceable. It is not recommended that old printers are immediately decommissioned, but that employees gradually learn to print in the corridors, disconnecting old printers as needed, in the case of malfunctions or when there is a lack of consumables. Consumables in new the network printers last a few weeks to months in heavy traffic, so interventions in replacing material is minimal, which removes the burden on technical support (helpdesk).
Old network printers can be used directly at the secretariat or larger enclosed offices where other employees do not have access. By the information in Table 4, the number of incompatible network printers is 12 and, therefore, it is possible to cover 12 separate sections as needed by the organization. However, it must be assumed that these printers remain the current printing system, either networked, without security or compatibility for all employees.
For both local and network printers, it is up to the organization to decide if it is necessary to continue using the printer in order to purchase the material. We recommend to separate older printers from newer ones, limiting redemption, and discarding outgoing printers. A transitional period for staff to adapt to the new system will be maintained. By limiting the purchase, the employee will have to accept that, over time, the printer will be disconnected and they will no longer be able to use it.

5.2.5. Final State of the New System

The layout of printers, including the purchase of new equipment to cover the remaining sections, is secured throughout the building. In every single corridor is a large multifunction device that is under the new printing solution system. The maximum distance from the printer to any office is 25 m. Employees, after registration in the system, receive an installation link (without administrator permission) and personal PIN to identify the printer. They will see an option in the menu when printing documents to the print server. All jobs that can be printed are stored in a so-called print job. When the employee decides that they need to print the materials, they arrive at any printer and after identification gains access to the system. Here they have the opportunity to print individual documents. The advantage is that the printer does not print the documents until they are identified, and will not be confused for another employee’s printed materials and removed materials by another person. After printing the employee has either the option to continue with another activity or log out of the system. Other options are available to scan when you sign in documents directly with an email address or portable device, make a copy, or send a scan to other employees. By synchronizing with the system, the entire contact directory is available. If the machine malfunctions, it may be sent to another printer and finish printing there. In case of malfunction or other defect, the system informs a technician of the type of error.
The advantage of the whole system is that, even after the purchase of new devices, these devices will still be able to be added directly into the system without having to locally set the device to the place of operation. Simply pair with the system when connecting to the network and the print solution itself configures it according to the pre-set settings by the organization.
With the adoption of a new printing solution, new opportunities will be created. The main task is to deploy printers to evenly cover the organization. Each will have at least one printer with a new system available, and the employee will be independent of technical support when the access is generated.
No further installation or configuration of the printer from the technical side will be necessary. The new system will take care of everything and after making the manuals, employees will be able to print fully autonomously. After a gradual reduction of used old printers and focusing on one type, organizations will also reduce the number of types of consumables materials. One kind of consumables will relieve warehouses and problems in planning and ordering toner cartridges for small local printers. The new system offers a notification system to simplify traffic and support new printers. By monitoring not only can the organization immediately identify the printer error, but it can collect the necessary data and obtain output reports from the system about the number of pages printed per specific employee. This will reduce the number of printed pages from people who have printed regardless if for work or for other needs. It will also unify printers with the new system in a way that one printer is not tied to one location. Employees can print regardless of its location on any printer in the building. Additionally, a malfunction of one printer does not stop the printing operation and it is possible to use the nearest printer without any intervention. In case of long-term failure it is possible to have a place where the printer is missing, moving another, or new printer (after quick configuration it is possible use immediately), without additional intervention by technical personnel. The last new opportunity is independence from other systems or from supplier support. After the implementation is complete, the organization manages the new system itself.
Among the newly emerging threats, we are primarily afraid of change from the employees. The new system or new printer layout, or the removal of personal printers from employees, can trigger a refusal to adapt. The fear of change is expected to adequately prepare the employees concerned. Among the threats related to the deployment of the new system from a technical point of view, we can only include implementation or implementation issues with respect to system outages. However, such threats can be minimized with thoroughness in planning and control.
The adoption of the new system creates certain opportunities and threats that are summarized in Table 5.

5.3. Financial Analysis and Budget

During the planning before the presentation to the manager, it is necessary to prepare the price of the new solution. With the new system, it is necessary to define the necessary requirements, which will be priced and the price will depend on them. The financial plan is divided into the following categories:
  • Price for software and application and printing solution licenses
  • Hardware price
  • Price for implementation and other additional services
  • It is necessary adhere to minimum requirements when searching.
  • Support for Kyocera, HP—Hewlett Packard and others
  • Application support for Windows Server 2008 and later
  • Secure printing support (PIN, RFID—Radio-frequency identification chips, encryption, etc.)
  • Suitable for large organizations of 400+ employees
  • Operating on the Slovak market with the Slovak interface of the application
  • Modified application for easy operation
  • Generate reports to a specific user
  • Analysis of print jobs
  • Web access
  • Remote automatic installation and access
  • Direct printing
  • Monitoring network devices
  • Monitor alerts and reports
  • Print failure protection
The price of the software depends on the particular provider. In the detailed analysis, together with the type of printer to which we want to apply the system, it is taken into account separately as one system. The MyQ application combines the functions of the print and service module into one system, covering all print jobs and customer needs (learn more about the product in Section 3.2.2.).
By contacting providers and requesting a quote from our requirements, the most suitable offer is shown in Table 6.
For each single printer it is necessary to buy a contactless reader for RFID chips and a license to activate USB inputs. Next, it is necessary to buy a printer terminal license and a license to activate the printer in an application that runs on the internal company environment (virtual machine or cloud). Finally, it is necessary apply the license to the virtual machine on which the entire application will run. It implements these tasks, including annual support by the supplier, directly inside the organization. Finally, the amount for initial training of responsible helpdesk administrators is required.
As the Kyocera TASKalfa 3552ci is out of stock, it is necessary look for similar model. Its successor is the Kyocera TASKalfa 3553ci printer, which has similar functionality as its predecessor and with the exception of a few visual changes is identical. The previous model has identical consumables, which will make it easier to manage and order supplies. The price of hardware is for five multifunction printers, up to a total of 20. The final price of all operations is 27.955,20 € incl. VAT. The price includes all the aforementioned services and products, including delivery, annual technical support, and a lifetime warranty on MyQ.

5.4. Proposal for Implementation

The whole implementation process is divided into individual sections. First of all, it is necessary to focus on the preparation of the necessary elements that are required for both the company and the supplier. It begins with detailed pre-installation preparation, where the supplier is provided with all the necessary documentation and the implementation environment is prepared. After implementation, it is necessary to fine-tune all specific settings. We work closely here with a vendor who guides us through the steps. After the setup is finished, it is possible to conduct a test run to test each feature and it is necessary look for system errors or flaws. Additional adjustment follows, such as program troubleshooting. Finally, it is possible to define and compare the current state and the final state. We compare the final state with the desired state that we originally wanted to reach. If it meets all desired aspects, such as functionality, safety, etc., we can switch to real operation. Before starting the system for others employees, technicians must be provided the necessary train training. At the end the implementation period is the period of correct operation, after which the project is closed (Figure 2).
The planned timetable is divided as follows:
  • Project launch (five days)
  • Current situation analysis (three days)
  • Creating a suitable solution model (one day)
  • Financial plan and market research + supplier selection (two days)
  • Preparation before implementation (two days)
  • Implementation + Additional settings (3–5 days)
  • Test run + troubleshooting (5–9 days)
  • Training (1 day) + delivery of new printers (1–5 days)
  • System start-up + troubleshooting (5–6 days)
  • Project closure + reserve (1–4 days)
The maximum duration of the project was planned for 30 working days. The shortest duration was 21 days (first day of operation). A nine-day reserve has been created to stabilize the operation of the new system.

5.4.1. Preparation before Implementation

In preparation before implementation by the supplier it is necessary to create a space where all processes will take place. It is necessary to create a virtual space (server) on which the supplier implements everything necessary for the realization of printing operation management. Server requirements are nothing special and are only basic specifications. Since an organization requires an application to be internally designed, it must be localized within the company. It is, therefore, necessary for the organization to be given space for the implementation provided.
The minimum requirements according to official MyQ sources are shown in Table 7.
Based on the minimum requirements, the company has prepared a Windows Server 2002 R2 virtual machine with a quad-core Intel Xeon CPU E5-2603 v4 2.20 Ghz and allocated memory at 16 GB. Storage disk size is limited to 120 GB for programs and databases. If necessary, the space will be scalable. After creating the virtual machine, a domain account will also be created to serve as access to the virtual machine and will be the key (identifier) of the program to the domain. After these simple preparations, the computer is ready for implementation.

5.4.2. Description of Implementation by the Contractor

After simple preparation of the virtual server, the next step is the implementation of printing management. Contractors use an auxiliary prepared account with permissions they start remotely by an auxiliary VPN connection to implement the necessary applications and software. Implemented applications include MyQ Terminal Manager, MyQ Easy Config, and MyQ Web Administrator.
MyQ Terminal Manager provides all processes of print and print management, connecting directly to the Active Directory database and sync servers from where it can retrieve data, such as user accounts and their properties. MyQ Easy Configurator is the basic application for the initial setup of all processes, creating backups of databases and other settings, identifying threats, and logging all printing events. The last application is the MyQ Web Administrator, which provides access to applications over a web connection. Using a web connection provides the ability to monitor processes as well as solve user sessions. Thus, access for IT server administrators will only be required if the web client is unavailable.
After the necessary software is completely installed, it is necessary to configure all settings that will in accordance with the organization’s technician (Figure 3).

5.4.3. Description of Specific Settings

Once the vendor implementation is complete, one will be able to join using the master manager account, which can access the entire interface. Others will need to be configured before starting the first test print/operation. Between network settings one will need to define additional settings, such as the name of the access account that will be use the application for domain verification. It will also be important to set up an http proxy server for communication and notification through the application. The setup procedure before the first test run is shown below.
In the first step it is necessary to define the end stations, e.g., printers, which will be managed by MyQ. Since the appropriate printers have been pre-defined, they are selected from the list of printers with the exact IP addresses. The program also defines a range of IP addresses that are normally assigned to printers in the format (10.10.0.0–10.10.3.255). In this case, it is not necessary to have predefined printer IP addresses, but from an IP range address, the program searches for and identifies the printer that is found to be suitable or compatible with the MyQ interface (Figure 4). Likewise, if a new printer is involved in the future suitable for management, the MyQ program performs regular checks to identify such printers and adds them to the list. After identifying all the printers it is necessary to reinstall the software and activate a contactless card reader locally on the printer.
To maintain uninterrupted operation, one must reinstall the printer without disruption of employees’ printing, therefore, a schedule of all printers will be created, which will be reinstalled at certain times. This breakdown will be provided to employees concerned with a warning of interruption. Installation readers and reinstall software is expected to take 5–10 min per printer, which is hardly any time at all. After the software is reinstalled the printer will still work with its original features. That is, except for a different graphical display, it works the same way. No additional work requires intervention. The printers will be ready to switch to the new available mode directly in the web application. This will enable enhanced mode or deactivate the publisher as needed.
The second essential step is to synchronize employee accounts directly from Active Directory. The sync users option is selected in the settings tab and the synchronization source from Active Directory is added. By setting up a domain LDAP (Lightweight Directory Access Protocol) server and a network database access account, it accesses the Active Directory structure tree to define the necessary organizational features and folder trees. In this case, the organizational units of the individual sections and departments of the organization are defined.
Due to the number of impersonal accounts, each department or section is defined separately so that there are no non-user accounts in the MyQ management system. This can be the manager accounts of the supplier’s business, and so on. This way, they can be filtered out and only employees’ accounts will be added or removed with regular sync.
In the properties one can define individual data that will be synchronized with the user account. It can be mail, phone number, personal number, assigned chip card, address, class, or other. All this data will help in identifying the user for further settings. After selecting the necessary data, one can start the synchronization and check the functionality of the program.
After successful synchronization, a list of employee accounts will be available to define additional settings. Since test operation has not yet started, there will be no need to assign PIN access codes and installation servers.
In the meantime, one can set up a basic setup policy that will apply when they print and use MyQ (Figure 5). There is no need for specific settings, but it will be possible to define default settings for each print, if necessary. We will be able to force document printing in black and white, which is not an option in this case. However, we will be able to set automatic printing on both sides, thus reducing the consumption of material, e.g., paper. These settings can be set for predefined created groups or individually for specific printers. For example, a trainee or intern can restricted from color printing or to certain printers. However, these constraints for the real organization will not be necessary, as each user must have full access to each printer, in full.
The third important step is to set up backups via the task scheduler. Task Scheduler is one of the many features of the application. Among the most important are the backup of the database and settings. In the event of a problem or failure, these settings are easily restored from backups and all processes need not be set up from the beginning. This option is important, but the settings are not made daily, so the automatic backup is set to every 24 h. More regular checks also include checking drive vacancies. In case of heavy traffic or system load (number of prints; bulky tasks) is a scan of disk space that registers the threat, performs a backup, and suspends the operation as a rescue against system overload. This task is set to minute intervals because of the possibility of a sudden increase in space usage by users. Other regularly recurring tasks include the backup of the log, which monitors and saves every single activity and task created in the system print management.
Furthermore, system maintenance (deleting old users or long unprinted jobs) and regular synchronization of new users is conducted. There is an option to create several other tasks in Task Scheduler, which we can also add the frequency of repetitive operations (Figure 6).
It is necessary to print in the printing system before sending the first authorizations defined by the email notifications, which are fully modifiable. Although it is an international organization it has decided to define all announcements and draw attention in both English and Slovak. Basic notifications include:
  • Email for newly registered users
  • Email with new PIN
  • Email with reset PIN
It is also possible to define the complexity of the password that users can connect to the web interface and manage their tasks. A predefined password is sent to the account PIN.
Notifications will only be sent when new PIN codes are generated or automatically when you create new accounts (via the Task Scheduler). They will be in the notification, including base data, defined login name and PIN, and installation link, together with instructions on how to use the printer for the first time.
After all these settings, the first tests can be run on the selected printer and predetermined users. In this case it will be a printer at the computer science department and test users will be the technical support staff.

5.4.4. Putting into Test Operation

After the first setup check tests, the first test operation can be started. In order to minimize the risk of problems, the introduction of a new system (as outlined in Section 3.4) will apply to printers gradually, and a newly introduced printer will always have a technician to monitor responses and assist users in getting to know the new system. However, before deploying to the first printer, an informative email will be sent with all the detailed information about the introduction of the new printer and print management system, so that the user will not be confused at the first meeting with the new interface.
The first implementation wave will be started by defining the printer in the system. Printer settings define printing with forced printing exclusively through MyQ. This causes the printer to no longer be displayed at the original address (IP address printing). It is also defined on the printer with a security lock, or PIN. Once these settings have been made, the printer will be reconfigured within a few minutes and the numeric keypad will replace the original display asking the user to enter their security key (Figure 7).
In this step, the printer is set up. Welcome groups were sent to the test group along with instructions and a new generated PIN. A technician present at the printer willingly presents the new system and answers all questions.
After testing of all features, the most frequently asked questions will be recorded and a prepared response sheet created, which will be inserted into outgoing notifications with a new PIN. After the first test run, it is now the turn of the others to switch over printers to the new mode. The test operation was scheduled for five working days. All questions or complaints that are submitted will be recorded for further processing and evaluation.

5.4.5. Troubleshooting

Periodically recurring after the first week of operation of the new system questions about the need to secure printers. These questions were answered and forwarded to new incremental members.
Problems in using the system were also evaluated. On this basis a simple manual was created, which is available on the company intranet or close to the printer to study. Furthermore, problem readers were recorded: devices that were unable to recognize older smart cards on the first try. This problem, however, will be solved in exchange for new hassle-free smart cards. After these steps, it is possible to assess the success of the new system and further explore its more detailed functions.

5.4.6. State of Play

A better understanding of the present and future state will be helped by the before and after state diagram in Figure 8. In the first section, a classically connected printing system can be seen. Local printers are connected to only one computer at a time. Network printers are always connected to the nearest computer station. It can happen that one computer has more than one connected network printer, or the opposite situation, where the computer does not even have a printer assigned. In this case the employee is unable to print and must ask for a manual local installation or the nearest network printer. Portable devices, such as laptops or other data-free computers, also have the ability to print from other locations as long as they are plugged into the network. However, this does not solve the problem that they are always available only one pre-installed printers. There is a possibility to install other printers, but it may happen that the employee has something to print, and they forget which printer has sent it. Here one can see the problem of unmanageable printing and poor printer layout.
In the diagram in Figure 8 of the future state, the complex connection and control of printing (and other functions) through the central printing solution system can be seen. All computers on the network automatically have unlimited access to the printing system. It does not matter on the printer location, but on the network connection status. After authorization (explained in Figure 9), the desired file is sent to the print server, from which the print job is sent to the desired printer. The main difference of the new solution compared to the old one is that, regardless of whether the printer is broken or up-to-date and used for other activity, it makes printing uninterruptible. Another important aspect of the difference in the conditions described is that the solution does not affect previous local or network printing on devices that were not modified or enhanced with MyQ. The old system works as long as the organization does not change itself.

5.4.7. Final Status

To describe the final state, the system can be displayed using the final diagram future state. In the first part we can identify classical computer stations that send printed documents over the network directly to the print server. The print server registers the request and stores it in the database. The print job is assigned to the registered sender. The name is compared with the database in Active Directory. This means that the print job can only be printed or canceled by the user themself or, alternatively, an administrator. If the user decides they need to print the sent documents, they need to go to any printer with a secure print interface and enter their code on the display identification keypad. The default key is a six-digit PIN code. After logging into the system, the user has the option to print documents or cancel their printing (this option via a web application directly from their computer). After the jobs have been printed, if they do not sign out, the user will be automatically signed out within one minute for security reasons. The printer has the possibility of using other printer features, such as scanning or faxing. The employee needs to specify the addressee before scanning the necessary materials. One option is to automatically send everything to the logged-in user email. The second option is to select one or more recipients from a list that is synchronized with Active Directory and contains all contacts of employees, or other important addresses. The greatest difference from ordinary network printing is in document security throughout the time of sending to receipt of printed documents. The final solution model is outlined in Figure 9.

5.5. Print Security

Printing security was one of the most important reasons for the recovery of the original system. General security protects the user from unwanted printing on devices that were not previously desired in situations where the user has preset another network printer. All data, whether it is user–server–printer communication or reading the status data from printers, is encrypted. Additionally, MyQ can encrypt the entire database containing sensitive data about users and their scanning and print jobs.
After printing the materials one can simply can forget to go pick up their printed material, or it can be stolen by someone else who printed materials before or after. Likewise, the author can mistake two identical printers and send the wrong document, and one can only wonder why the document did not print. In the same way duplicate IP addresses may be confused when configuring other new printers. In this case, the printed document can be printed on both printers, respectively, and there is a situation where one cannot print to either printer. The new security system is infallible, the user simply prints what he needs. It may happen that the employee printed something then changed their mind, made a few changes, and printed again. Due to this mistake, the new system does not need to print both documents and the user can simply choose which printer they want to print the document. Additionally, via the web, after logging in, the system page can modify or cancel all print jobs. The new system also provides the ability to repeat printing. The user simply sets up the application. Regular or popular files that do not need to be sent before each print but they simply remain in the system and can be printed out at any time computer use. Furthermore, the user is protected from unwanted (anonymous) takes of scanned documents, because when the email is received, the sender that was logged on to the printer is informed. In such case, the sender is immediately identified and marks the perpetrator of the mistake.
The second form of security when logging in is the option to register a chip card. Every employee is obliged to carry this card or chip at all times. Since these cards serve as identification at entry and record in turnstiles, everyone has such a card available. This card can be registered directly in the printer and a forgotten PIN can be identified by the printer. Additionally, if one forgets, or there is a malfunction of the reading device, it is still possible to verify with a numeric code.
In case of the permanent loss of a PIN, it is possible to request technical support for a new PIN, which is generated directly in the application. When a new PIN is generated, the number combination is encrypted and sent directly to the user’s email. If one loses their card they can get a new card registered on any printer without limiting the number of used cards.
At the same time, the printer is protected from unauthorized access to the system by strangers. Foreign persons or employees without a personal account assigned and the login code do not have the ability to perform any action on the printer. This will eliminate anonymous copying operations on unattended printers. Furthermore, the printer is protected against unauthorized interventions when replacing consumables. The printer is protected by an administrator password, which allows access to advanced settings and detailed analysis during a physical check. Toner inputs are also protected in an area that is only accessible after an administrator is identified. Since it is set in notification system, it is not necessary to report low levels of consumables, as this would duplicate toner replacement requirements.
Since the responsibility of printer and system management falls to the helpdesk department, it is at their discretion whether or not they will use secure access. The system can manage the printer without the need for passwords and IDs. For smaller printers (not in in our case) there is the possibility to activate the so-called safe mode on the printer, which does not require user identification and simply prints documents as soon as they are received. We recommend using this option for smaller- or medium-sized devices, which are otherwise secured. For example, these can be printers that are directly in the office or in closed secretariats where the printed documents can be taken over by someone who it does not pose a threat of leakage of sensitive information. These printers are also secure against unwanted actions, such as changing settings or misusing sending messages/scans from other sender addresses. Additionally, this type of printer is in the system management and is fully monitored. That is, it records the number of pages printed per person or by groups created (departments, floors, or any partition settings in the system).

5.6. Monitoring and Administration of the New System

The technical department receives requests to the information system on the basis of requests from employees. Such a request is assigned to a free technician who is assigned to solve the issue. The application was in a pending state when technicians were unavailable. Due to long wait-times of ongoing requests, the employees decided to act on their own and chose to solve the problem separately. In such cases, further damage occurred and subsequent retirement of printers was due to damage, such as broken plastic, holders, or other moving parts of the printer.
The new system uses a system of notifications on consumables. This system is fully adjustable and informs competent staff about the condition of the equipment. With the deployment of the new system, one technician manages to provide printer support. Forced use of network printers and gradual reduction of small local printer consumption has also been reduced due to frequent printing errors. Network printers that use high-capacity printer toners that last several times more than small toners. For large installations, the number of reported failures has decreased by more than half. With the notification system, a technician alerted states is determined between 1% to 5% failures. After these reports it is ready for recovery and the toner is always refilled the next day or, in case of heavy load, on that day, and the toner balance status is reported. The technician knows when a misfeed or other fault is reported, and intervenes almost immediately. In the event that a problem, such as a paper jam, or other, is identified the problem is resolved before the user reports an error. The most common problems caused by user errors are incorrectly loaded paper in the trays (A4 loaded in tray A3), which causes a printer malfunction or immediate paper misfeed in the feeder. Forgotten materials in devices, such as printed documents or USB memory keys with the new security system printing are reduced to zero.
The Technical Department delegates unresolvable requirements to either the printer supplier (technical issues) or system vendor (MyQ issues).

Training and Manual Creation

The last step of the implementation is to document the system and train the personnel. A training package for the System Management Technical Department was also purchased for delivery. The complexity of the system is not very high, so it can be operated by one technician. However, in order to ensure substitutability, everyone will participate (Table 8).
All these points were addressed in the implementation or additional settings, however, they need to be controlled by other technicians to represent them at the inception of problems. The possibility of allocating powers to technicians is recommended, maintaining the chief technician and allocating other work tasks to other technicians to avoid unwanted errors when using or changing the system. A technician who only assigns new security keys or a technician that can produce reports or monitor supplies status, will not be authorized to other configuration settings, whether terminals or the web interface. Thus, there is the ability to assign simple permissions to untrained helpdesk employees, maintaining wide substitutability in the absence of technicians (e.g., late evening or in the morning with a lost PIN, another authorized worker may generate a new PIN but will not be entitled to other things).

5.7. Closing a Project

At the end of the project it is possible to compare the realization of the real project with the plan. The progress of the project is recorded in the Gantt chart in Figure 10.
The final check is very important and, before submitting the project, it is checked whether the project progress has met the pre-set limits and fulfilled the individual points of the tasks according to the plan. Since it is a project in an organization chart, it is shown only on business days and not on calendar days.
Project start was set to day 0, and five working days were reserved. During these days, the groundwork for meetings with the observer was discussed and prepared. The next point included the individual observations of operation, environment and functionality of the current system. On the basis of that observation and discussion with authorized persons, the prepared materials served as a basis for the design of a new solution. Creating a proposal as the next point was realized the next day with a reserve the next day for the presentation of organization solutions. The analysis was performed on an ongoing basis which was chosen by a suitable supplier, who also submitted a price offer. After successful approval of the proposed model, the organization could have started to implement the solutions phase. Once the proposed model was successfully approved for the organization, the solution phase itself could start. On the seventh day, the preparations needed before the implementation of the new system began. Two days were reserved for these preparations. Since the delivery of new printers was not necessary at the implementation of the new system, the deadline was set for day 21, when the supplier had to deliver and operate the remaining (newly purchased) printers. Operation of new printers did not exceed one day. After the preparations, the implementation phase of the new system could start, for which three days were allocated for the implementation and configuration of existing printers.
The test operation was scheduled to start on day 13 with a five-day run. Prior to this phase it was necessary to inform the persons using the given printer to change and provide other information about the new system. During this time, a new phase called Bug Fixing and Control was launched. This phase was conducted at the same time to fine-tune printer and system settings, or collect data errors to provide users with answers to questions. At this stage said response sheet was created already, which is used to inform other employees after full operation. After the test operation was completed, there is a period where other helpdesk employees will receive the necessary training to operate the new system. After successfully completing the training phase, we could proceed to the final, and most important, phase, namely, full operation. Employees were informed before this launch on the following steps and received prepared answers to questions and instruction manuals for using the system. Outputs and inquiries of employees were checked during the entire period of operation. After five days of operation without significant errors, the deficiencies phase is completed and after the checks are completed we can terminate the project.
As can be seen from the Gantt diagram of the course of activities performed over time, the project was carried out within the deadline of 30 working days. Thanks to sufficient reserves soon all phases met the standard, as planned. The closing of the project was four working days earlier than expected.

6. Conclusions

At the end of the article, it is possible to confirm the achievement of the main objective, namely, the creation of a new model of print management, its implementation, and commissioning. The solution focused on a company with a large number of printers and a poorly designed printing system. Thanks to the good attitude of the company, as well as the possibility of observation of the company, the issue was identified and the strengths and weaknesses of the printing process were defined. After the analysis, an alternative solution was proposed and a new model was created to replace the existing system. The article discusses in detail the whole process from the selection of the solution to the planning of individual procedures for its implementation into operation during the continuous operation of the organization. It was also proposed to remove the old system with regard to environmental impacts, as well as to deal with the problem of possible resistance by employees when deploying the new system. Opportunities and threat analysis, which was carried out during the project implementation, contributed to these solutions. Real project data was used for the project. The data were obtained from market research, on the basis of which the financial and time assumptions of the price of the whole implementation could be specified.
The main benefits of the work include not only the analysis of the status of the selected organization, which it was used to design a new printing model, but also the model itself, which is applicable to a general society with similar printing problems. The work brings a solution that has minimal disadvantages and threats and brings a system with a great benefit not only from the viewpoint of security and distribution of the press, but also from a high degree of autonomy. The installation of local printers in the organization is a thing of the past, and this work can serve as a basis for realizing new projects for other companies with the same problems.
Problems, such as rejecting the new system and adapting to new printing habits in the corridors, are only a temporary question. However, negative attitudes were expected. After a sufficient presentation and a presentation of the positive aspects, it is possible to replace the old printing system in its entirety with this system.
Another recommendation for the company is to include other branches in the new system, which can be managed directly from the main central building. Under one system there may be several subsidiaries and the parent may control, or monitor, printer management. Since the parent company manages subsidiary networks and other IT security, the transition of printer management can relieve the individual branches, thus saving on trips or working hours of branch IT professionals.

Author Contributions

The work was done collectively, evenly by all authors in all sections. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Kokles, M.; Romanová, A. Informačný vek; Sprint vfra: Bratislava, Slovakia, 2000; ISBN 80-88848-66-0. [Google Scholar]
  2. Kryvinska, N.; Gregus, M. SOA and Its Business Value in Requirements, Features, Practices and Methodologies; Comenius University in Bratislava: Bratislava, Slovakia, 2014; ISBN 9788022337649. [Google Scholar]
  3. Scuotto, V.; Santoro, G.; Bresciani, S.; Del Giudice, M. Shifting intra-and inter-organizational innovation processes towards digital business: An empirical analysis of SMEs. Creat. Innov. Manag. 2017, 26, 247–255. [Google Scholar] [CrossRef]
  4. De Bernardi, P.; Bertello, A.; Shams, S.M. Logics Hindering digital transformation in cultural heritage strategic management: An exploratory case study. Tour. Anal. 2019, 24, 315–327. [Google Scholar] [CrossRef]
  5. Gregus, M.; Kryvinska, N. Service Orientation of Enterprises—Aspects, Dimensions, Technologies; Comenius University in Bratislava: Bratislava, Slovakia, 2015; ISBN 9788022339780. [Google Scholar]
  6. Kaczor, S.; Kryvinska, N. It is all about Services—Fundamentals, Drivers, and Business Models. Soc. Serv. Sci. J. Serv. Sci. Res. 2013, 5, 125–154. [Google Scholar] [CrossRef]
  7. Závodný, P. Computer Networks and Distributed Data Processing; Sprint: Bratislava, Slovakia, 2001; ISBN 80-8884876-8. [Google Scholar]
  8. Thubert, P.; Nordmark, E.; Chakrabarti, S.; Perkins, C.E. Registration Extensions for IPv6 over Low-Power Wireless Personal Area Network (6LoWPAN) Neighbor Discovery. RFC 2018, 8505, 1–47. [Google Scholar]
  9. Kozák, M. Linuxexpres.cz. Home Computer Network—Parts 1 to 9. 2012. Available online: https://www.linuxexpres.cz/praxe/domaci-pocitacova-sit (accessed on 18 November 2019).
  10. Fortier, P. CRC Handbook of Local Area Network Software: Concepts and Technology; S.L. CRC Press: Boca Raton, FL, USA, 2018. [Google Scholar]
  11. Olejár, D. Legislatívny zámer zákona o informačnej bezpečnosti; Univerzita Komenského: Bratislava, Slovakia, 2017. [Google Scholar]
  12. Price, B. Active Directory: Best Practices and Problem Solving; Computer Press: Brno, Czech Republic, 2005; ISBN 80-251-0602-0. [Google Scholar]
  13. Stanek, W. Active Directory: Administrator’s Pocket Advisor; Computer Press: Brno, Czech Republic, 2009; ISBN 978-80-251-2555-7. [Google Scholar]
  14. Halouzka, J. Informační Bezpečnost: Self-Assessment: Příručka Manažéra; TATE International: Praha, Czech Republic, 2003; ISBN 9788090285897. [Google Scholar]
  15. Lemon, T. The DHCP Handbook; SAMS Technical Publishing: Indianapolis, IN, USA, 2003. [Google Scholar]
  16. Lin, Y.C.; Chen, T. A ubiquitous manufacturing network system. Robot. Comput.-Integr. Manuf. 2017, 45, 157–167. [Google Scholar] [CrossRef]
  17. Copy Office S.R.O. The Most Popular Way to Ensure Quality Printing in Companies. 2018. Available online: https://copyoffice.sk/en/rentals/ (accessed on 1 December 2019).
  18. Janus Ltd. 2018th Kyocera Corporation. 2018. Available online: http://www.kyocera.sk/produkty/tlacove-riesenia/myq (accessed on 3 December 2019).
  19. RICOH S.R.O. System and Printing Solutions MyQ. 2018. Available online: http://www.ricoh.cz/cs/sluzby-a-reseni/systemova-reseni/tiskova-reseni/MyQ (accessed on 3 December 2019).
  20. Evans, R. The Human Side of School Change: Reform, Resistance, and the Real-Life Problems of Innovation; Jossey-Bass Inc.: San Francisco, CA, USA, 1996. [Google Scholar]
  21. Phadermrod, B.; Crowder, R.M.; Wills, G.B. Importance-performance SWOT analysis. Int. J. Inf. Manag. 2019, 44, 194–203. [Google Scholar] [CrossRef] [Green Version]
  22. Sákal, P. Strategic Management in Manager’s Practice; Synergia: Trnava, Slovakia, 2007; ISBN 978-80-89291-04-5. [Google Scholar]
  23. Papula, J. Strategic Project Management; Pagoda: Bratislava, Slovakia, 2012; ISBN 9,788,096,969,869. [Google Scholar]
  24. Cadle, J.; Yeates, D. Project Management for Information Systems; S.L. Pearson Education Limited: London, UK, 2008. [Google Scholar]
  25. Kelley, J.; Walker, M. Critical-Path Planning and Scheduling. In Proceedings of the Eastern Joint Computer Conference, Boston, MA, USA, 1–3 December 1959. [Google Scholar]
  26. Rabogadi, T.A. Strategies Information and Communication Technology Managers Use to Build Employee Competencies; Walden Dissertations and Doctoral Studies, 3573. 2017. Available online: https://scholarworks.waldenu.edu/dissertations/3573 (accessed on 13 January 2020).
  27. Rudy, J. Management and Organizational Behavior; Faber: Bratislava, Slovakia, 2001; ISBN 80-89019-07-2. [Google Scholar]
  28. Ensuring GDPR. Privacy Policy—GDPR Slovakia. 2019. Available online: https://gdpr-slovensko.sk/co-znamena-ochrana-osobnych-udajov/ (accessed on 5 January 2020).
  29. Slov-Lex. Act on the Protection of Personal Data and on Amendments to Some of Them Laws. Collection Acts SR. 2018. Available online: https://www.slov-lex.sk/static/pdf/2018/18/ZZ_2018_18_20180525.pdf (accessed on 12 January 2020).
  30. Černá, M.; Sieber, R. Approach of selected business entities to GDPR implementation. ACC J. 2018, 24, 20–31. [Google Scholar] [CrossRef]
  31. Kryvinska, N. Building Consistent Formal Specification for the Service Enterprise Agility Foundation. Soc. Serv. Sci. J. Serv. Sci. Res. 2012, 4, 235–269. [Google Scholar] [CrossRef]
  32. Advisera. Clause-By-Clause Explanation of ISO 27001; Advisera Expert Solutions Ltd.: Zagreb, Croatia, 2017. [Google Scholar]
  33. Molnár, E.; Molnár, R.; Kryvinska, N.; Greguš, M. Web Intelligence in practice. Soc. Serv. Sci. J. Serv. Sci. Res. 2014, 6, 149–172. [Google Scholar] [CrossRef]
  34. Amendola, C.; Calabrese, M.; Caputo, F. Fashion companies and customer satisfaction: A relation mediated by Information and Communication Technologies. J. Retail. Consum. Serv. 2018, 43, 251–257. [Google Scholar] [CrossRef]
Figure 1. Graphical representation of the network topology layout for large multi-organization buildings with a direct connection to the data center. Source: own processing.
Figure 1. Graphical representation of the network topology layout for large multi-organization buildings with a direct connection to the data center. Source: own processing.
Applsci 10 04193 g001
Figure 2. Gantt Chart of the original planned project timetable. Source: custom processing.
Figure 2. Gantt Chart of the original planned project timetable. Source: custom processing.
Applsci 10 04193 g002
Figure 3. MyQ Easy Config Initial Program. Source: custom processing.
Figure 3. MyQ Easy Config Initial Program. Source: custom processing.
Applsci 10 04193 g003
Figure 4. Detecting and searching for new printers via MyQ. Source: custom processing.
Figure 4. Detecting and searching for new printers via MyQ. Source: custom processing.
Applsci 10 04193 g004
Figure 5. Basic policy settings for print jobs and printers. Source: custom processing.
Figure 5. Basic policy settings for print jobs and printers. Source: custom processing.
Applsci 10 04193 g005
Figure 6. Setting up the task scheduler (creating recurring actions). Source: custom processing.
Figure 6. Setting up the task scheduler (creating recurring actions). Source: custom processing.
Applsci 10 04193 g006
Figure 7. Visualization of the splash screen on printers with the new system. Source: Janus Ltd., 2018
Figure 7. Visualization of the splash screen on printers with the new system. Source: Janus Ltd., 2018
Applsci 10 04193 g007
Figure 8. Diagram showing the layout of the print infrastructure in the pre- and post-implementation states of the new system. Source: custom processing.
Figure 8. Diagram showing the layout of the print infrastructure in the pre- and post-implementation states of the new system. Source: custom processing.
Applsci 10 04193 g008
Figure 9. Final solution model to easily view the printing process. Source: custom processing.
Figure 9. Final solution model to easily view the printing process. Source: custom processing.
Applsci 10 04193 g009
Figure 10. Gantt chart after project completion. Source: custom processing.
Figure 10. Gantt chart after project completion. Source: custom processing.
Applsci 10 04193 g010
Table 1. Comparison of prices of printed pages for different types of printer.
Table 1. Comparison of prices of printed pages for different types of printer.
Type of PrinterPrice Per CartridgeNumber of Printed PagesPrice Per Page
Small colored local # 132.70€4750.069€
Small Color Local # 273.00€14000.052€
Medium Color Mesh # 197.77€80000.012€
Medium Color Mesh # 299.90€92000.011€
Large Color Mesh # 1165.00€75000.009€
Large Color Mesh # 260.01€25,0000.002€
Source: custom processing.
Table 2. Proportion of different types and models of printers.
Table 2. Proportion of different types and models of printers.
Type of PrinterQuantityNumber of ModelsRatio
Local Printers (USB)622770%
Network Printers (LAN)27730%
Total8934
Source: custom processing.
Table 3. Defining strengths and weaknesses.
Table 3. Defining strengths and weaknesses.
StrengthsWeaknesses
Functional printing systemObsolete print structure
Good technical equipment (sufficient printers)Printer Layout
Qualified professionalsLarge variety of printers
Expensive maintenance and material
Unreliability of machines
Frequent interventions—performed locally—install/changes
Possibility to steal materials or leak information
Fear of change
No printer status monitoring
Source: custom processing.
Table 4. Proportion of suitable printers for use with the new system.
Table 4. Proportion of suitable printers for use with the new system.
Type of PrinterQuantityNumber of SpeciesRatio
Local Printers (USB)622770%
Network (incompatible) printing.12613%
Network (compatible) printing.15117%
Total8934
Source: custom processing.
Table 5. Opportunities and threats.
Table 5. Opportunities and threats.
OpportunitiesThreats
The new layout will cover the entire area organizationFear of change
Focusing on one type of printer will reduce an account of their speciesRefusing access to the new system
Easily manage and support printers Fear of changeSweeping to give up the old system of local printers
Monitoring—review and report errorsA new layout can put some workers at a disadvantage
Output reports on number of printed pages per specific person
Possibility to move printers without intervention by the worker
In the event of a failure to use another line near
Internal system and printer management is organization independent of other support
Easy extension with new printers
Source: custom processing.
Table 6. Price calculation of printing solution for the organization.
Table 6. Price calculation of printing solution for the organization.
TypeCountPrice with VAT
USB contactless reader EM Multi 125 kHz202376 €
MyQ 5 Popcorn, BusinessPro, Cloud, 10 network devices21344 €
MyQ Embedded Terminal, No Reader, Cloud, 10 devices25040 €
License Card Authentication Kit(B) * USB Port Activation License for USB Reader Connection201344 €
License: Virtual Machine High Availability Mode1672 €
Implementing MyQ on a ready server1367 €
Device installation + support 1 year20-
Training administrators1612 €
Total amount (software and licenses) with VAT11775 €
MFP Kyocera TASKalfa 3253ci laser (Color)516200 €
Together27955.20 €
Source: Janus Ltd., 2018, own processing.
Table 7. Minimum requirements for the MYQ system.
Table 7. Minimum requirements for the MYQ system.
Server/PC
Recommended4 GB memory
Number of cores (approx. 400 employees)4 x CPU-Central Processing Unit (2 Ghz)
The amount of available disk space
Application part at least300 MB
Data storage100 MB (14 days) (6 Gb-4 years)
Operating system (one of the following)Windows Server 2008 R2/2012/2012 R2/2016, Windows 7/8/8.1/10 Microsoft.NET Framework 4.5
Web browser (one of the following)Google Chrome, Mozilla Firefox 5, Internet Explorer, Safari 10
Source: Janus Ltd., 2018.
Table 8. Training content provided by the supplier.
Table 8. Training content provided by the supplier.
Introduction
MyQ easy config: service control, database backup and recovery
Client part 1—web interface MyQ—administrator
Client part 2—web interface MyQ—user
Printing equipment—search, report
Print jobs and queues—follow me, direct
Integrated embedded terminal—installation, configuration and de activation
Scan profiles—profile creation and configuration
Allocation of authorizations and policies
Creation of reports and reports
Troubleshooting and incident reporting
Source: Janus Ltd., 2018.

Share and Cite

MDPI and ACS Style

Karovič, V., Jr.; Kováč, F.; Karovič, V.; Veselý, P. Print Management System Model in a Large Organization. Appl. Sci. 2020, 10, 4193. https://doi.org/10.3390/app10124193

AMA Style

Karovič V Jr., Kováč F, Karovič V, Veselý P. Print Management System Model in a Large Organization. Applied Sciences. 2020; 10(12):4193. https://doi.org/10.3390/app10124193

Chicago/Turabian Style

Karovič, Vincent, Jr., Filip Kováč, Vincent Karovič, and Peter Veselý. 2020. "Print Management System Model in a Large Organization" Applied Sciences 10, no. 12: 4193. https://doi.org/10.3390/app10124193

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop