Enhancing Business Security with Big Data
Added on 2020-03-16
13 Pages3080 Words37 Views
|
|
|
AccountingInformation SystemsBusiness Process Analysis
![Enhancing Business Security with Big Data_1](/_next/image/?url=https%3A%2F%2Fdesklib.com%2Fmedia%2Fimages%2Fdw%2F65e33aff2391489b915ea8c33fb7043b.jpg&w=3840&q=10)
Business Process AnalysisTable of ContentsIntroduction.................................................................................................................................................3List of Participants, Inputs and Outputs.......................................................................................................3Current Business Process Model.................................................................................................................4Strengths of the Current System..................................................................................................................4Inefficiencies of the Current System............................................................................................................5Improvement through Business Process Re-Engineering & Use of IT........................................................5Technologies for Business Process Improvement........................................................................................6Business Intelligence...............................................................................................................................6Big Data Tools.........................................................................................................................................7Cloud Databases......................................................................................................................................7Security Tools..........................................................................................................................................8Other Technologies.................................................................................................................................9Proposed Workflow Diagram....................................................................................................................10Operations of the Newly Re-Engineered Business Process.......................................................................11Recommendations & Conclusion..............................................................................................................11References.................................................................................................................................................132
![Enhancing Business Security with Big Data_2](/_next/image/?url=https%3A%2F%2Fdesklib.com%2Fmedia%2Fimages%2Flb%2F872302d8dc9e4b2ca7cf4da4c6b8142b.jpg&w=3840&q=10)
Business Process AnalysisIntroductionGlobal Management Accounting Services (GMAS) is an integrated suite of outsourced accountsmanagement services that are provided to several small and medium sized business units andorganizations. It aims to maintain the quality and continuity of the operations, implementation ofthe technologies, resource management and optimization along with better management of labor.There are various services and operations that are carried out by GMAS. The report covers theanalysis of the business process that is followed and carried out in GMAS. The strengths andweaknesses of the current system along with the new systems and technologies that can beimplemented have been covered in the report. List of Participants, Inputs and OutputsThe participants in the current system include the managerial and operational members of thestaff at GMAS along with the various clients that are associated with GMAS. The accountingsystem that is associated with GMAS is also a participant that is used in the purpose of providingthe desired services and applications. The set of inputs include the sales data and records. The information of the contract signed by theclient, claim details, customer and supplier information come under the inputs that are providedto the system.The set of outputs include copies of invoice, forms of unpaid debt, reconciliation statement andpayroll reports. 3
![Enhancing Business Security with Big Data_3](/_next/image/?url=https%3A%2F%2Fdesklib.com%2Fmedia%2Fimages%2Fmj%2F6b31f04372604c6abc0774799c39e33f.jpg&w=3840&q=10)
Business Process AnalysisCurrent Business Process ModelCurrent Business Process ModelThe business process model that is currently followed in GMAS is as illustrated above. There arevarious activities that are covered under this process. The flow of the accounts receivabledepartment and the associated activities are represented with the help of a diagram. Strengths of the Current SystemThe current system has a strong reports management system and there are weekly andmonthly reports that are generated. These reports aid in the verification and validation ofall the activities that are carried out by GMAS. The follow-up process that is followed in GMAS is strong as it is this process whichhelps in the collection of information regarding the invoice and payment management(Nih, 2015). 4
![Enhancing Business Security with Big Data_4](/_next/image/?url=https%3A%2F%2Fdesklib.com%2Fmedia%2Fimages%2Fil%2Fa054dde5218c4f83825d70a9962074a9.jpg&w=3840&q=10)
End of preview
Want to access all the pages? Upload your documents or become a member.
Related Documents
GMAS Core Serviceslg...
|11
|1949
|489
Business Process Analysis - Assignmentlg...
|6
|1241
|140
Accounting Information Systemlg...
|10
|1608
|353
Accounting Information Systemlg...
|11
|1996
|52
Business Process Analysis: Optimizing Management Accounting Services with IT and Re-engineeringlg...
|22
|4609
|174
Business Process Analysislg...
|12
|2177
|204