Certai - An Introduction to Information Management System

Verified

Added on  2022/10/17

|9
|2525
|63
AI Summary
The venture of data mining equips an organization with the diversified aspects that eventually facilitates the purpose of analyzing the analytical data of the organization in regards to the business (Zaharia et al., 2016). The structural framework of data mining incorporates the algorithms that eventually helps in the identification of the hidden embedded patterns within the array of data and at the same time also facilitates the identification of the inter relational relationships between the data (Kosinski et al., 2016).

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Running head: REPORT ON INFORMATION SYSTEM MANAGEMENT
REPORT
ON
INFORMATION SYSTEM MANAGEMENT
Name of the Student
Name of the University
Author Note:

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1Information Management System
Introduction:
Abiding by the decisions undertaken by the management of the concerned organization, there
is the proposition of the inclusion of certain diversified software that would eventually amplify the
rate of production of the concerned organization in terms of business growth. The proposed tools and
software that are to be embedded within the structural framework of the organization are summarized
below- Data mining and big data intrusion that would eventually enhance the production rate
manifold. Introduction of CRM software.
The prerequisite hardware and software requirements for the accomplishment of the business
targets. Enterprise Resource Planning, necessity for the adoption of telecommunication in the
structural framework of the organization that would eventually eliminate the vulnerabilities of the
organization facilitating the business growth. Finally, there are a number of mitigation techniques
adopted for the purpose of combatting the risks and threats imposed by the cyber-attacks.
Data mining and big data:
Data mining is very crucial for any organization. The venture of data mining equips an
organization with the diversified aspects that eventually facilitates the purpose of analyzing the
analytical data of the organization in regards to the business (Zaharia et al., 2016). This in turn
empowers the organization with the capabilities to extract the relevant and essential information, from
the array of the provided information in the database that may be financial or strategic.
The structural framework of data mining incorporates the algorithms that eventually helps in
the identification of the hidden embedded patterns within the array of data and at the same time also
facilitates the identification of the inter relationships between the data (Kosinski et al., 2016). In due
course of this entire procedure, data mining facilitates the predictive analysis of the persisting data,
analyzing the same with the help of the algorithms and anticipating the fore coming data that is to be
obtained in the near future.
Document Page
2Information Management System
Big data made it’s entrain in the contemporary market scenario, owing to the exponential
augmentation of the data facilitated by the parabolic advancement of the internet and the digital arena.
Big data is concerned with the amalgamation of the structured and unstructured data. Big data
accounts to the predictive data analysis that renders the provision of implementing intelligence and
mapping the same over the array of the persisting data.
Customer Relationship Management:
CRM software is a prerequisite for the purpose of the accomplishment of the business goals
of an organization as the implementation of this software facilitates the acceleration of the business
growth of an organization, owing to its versatility and flexibility (Reicher & Szeghegyi, 2015). CRM
software empowers the organization with the capabilities that eventually renders the facilities for the
streamlining of the work flow prevailing within the organization.
This software proficiently preserves the minute details gathered from the sales processes
imbibed within the organization. CRM software facilitates the elimination of the errors, through the
provision of the double entry of the data in the database of the concerned organization. CRM also
empowers the organization with the distinctive features of transforming the manual systems into an
automated one.
This in due course of time facilitates the enhancement in the customer satisfaction through
proper delivery of the services (Kim et al., 2016). CRM software renders a common platform that
clubs the service, sales and the finance departments under a common roof which in turn amalgamates
all the processes running within the system and centralizes the entire structural framework of the
organization.
Hardware and software in BPC:
The prerequisite software that facilitates the procedure of Business Continuity and Disaster
recovery is BCDR software. Business continuity is the combination of all the procedures that enables
an organization to ensure the continuation of the business procedures irrespective of the hindrance
Document Page
3Information Management System
imposed by the adverse scenarios in case of a disaster (Hansen et al., 2018). The sole aim of the
business continuity plan is ensuring protection to the essential and the vital assets and aspects of the
company, and in due course of this entire phenomenon imparts robustness to the business
infrastructure thereby ensuring the long term sustainability of the organization.
BCDR software facilitates the organization with the capabilities to revive back to its
persisting arena accompanied by the proficiency of the workflow. BCDR software also facilitates the
recovery of the crucial analytical data and the financial data in the utter emergency of the disaster or
afterwards. This procedure is coined Disaster recovery.
The fundamental aspect of disaster recovery procedure is the technical planning that
eventually facilitates the preservation of the technical data during the sequence of a disaster, so that
the information can be recovered for the future implementation post the disaster is over (Fitzgerald &
Stol, 2017). This can be accomplished through the successful back up of the information, so that if the
database becomes inaccessible in the event of a disaster, the essential information can be accessed
from the back up folder.
Enterprise resource planning:
Enterprise resource planning (ERP), successfully makes the utilization of various diversified
computer oriented technologies that eventually fulfills the purpose of integration of wide spectrum of
diversified functions incorporating- inventory control, accounting procedures of the organization and
human resources across the territorial limits of the organization (Tarhini et al., 2015). ERP aims at
facilitating the effective and proficient business planning required for the purpose of accomplishment
of the business targets of the organization.
ERP also provides the provision for the sharing of the vital information within the
organization that leads to the centralization of the working procedure in the organization. ERP also
takes active participation in facilitating the decision-making procedures for the accomplishment of the
business requirements (Costa et al., 2016 ). ERP has enhanced the proficiency of the organization by
minimizing the time incurred after the sanctioning of the orders and dispatching of the payments.

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
4Information Management System
This has wiped out the huge requirement for the number of back office staffs and in due
course of this, has lowered the level of dependency of the organization over the labor power. ERP has
also been successful in enhancing the customer service of the organization through the provision of
lower time consumption invested after the order collection and delivery of the services to the clients.
Telecommunications:
Telecommunications has led profound impact on the operations of an organization in regards
to both products and services rendered by the organization thereby satisfying the customer
requirements and accomplishing the business goals. This enticing approach eventually lures and
motivates the clients to purchase the telecommunication-based products and services from the
organization (MacKenzie, Marks & Morgan, 2017). The particular citation in this scenario that
deserves significance is the customer installed WiFi based local area network that eventually
facilitates the generation of an interface capable of supporting the Voice over Internet Protocol
(VoIP).
The clients find this beneficial to buy the VoIP software from the organization for the purpose
of installation of the software in their own operated computer. This would facilitate the connection of
their computer to the internet through the internet service provider. Telecommunications facilitates
the switching operation of the circuits. VoIP enables the organization with the provision of installing
telephones in the structural framework of the networks.
Abiding by the principles of telecommunications, there is the provision for the integration of
the audio-based data, voice oriented data and video data, which has eventually enhanced the
communication procedure over the single network (MacKenzie, Marks & Morgan, 2017).. This
integration has widened the economical scope of the network that has been turned out to be effective
in diminishing the expenditures and the cost incurred after the production purposes.
Telecommunications also facilitates the communication between the diversified software applications
persisting in the structural framework of the organization.
Mitigating risks and threats:
Document Page
5Information Management System
The software environment of an organization has several vulnerabilities that expose the system to the
risks and threats imposed by the cyber predators with the motivation for gaining access over the
system. The suggested mitigation techniques for combatting such cyber-attacks are summarized as:
There is the urgent requirement for the adoption of a strong password which may not be
easily anticipated and presumed by the cyber predators (Singh et al., 2016). In due course of
this, this will impart robustness to the system thereby safeguarding the vital and crucial
information from being compromised.
There is the necessity of installation of the security software that would eventually combat the
hindrances and the associated risks and threats in alignment to the cyber-attacks (Singh et al.,
2016). This would also restrict the authorization to access over the system.
The software patches are required to undergo successive up gradation on a time to time basis
and probably this is the best possible remedy that can be adopted by an organization (Felton
et al., 2016). This ensures safeguarding of the software through the provision of infiltration
techniques employed for the purpose of combatting the cyber-attacks.
.Keeping the subsequent backups of the vital and crucial information of the organization is
one of the outstanding remedies in the regards of combatting and mitigation the associated
risks and threats imposed by the cyber-attacks (Felton et al., 2016). This renders the facilities
to access the data from the back up file in the case of restricted access over the database in the
event of a compromised system.
Summary:
This report summarizes the role of data mining and big data in the accomplishment of the
business targets of the organization. This procedure analyzes the prevailing data set of the
organization, anticipates the upcoming data, and accordingly brings about necessary alterations in the
infrastructure of the organization thereby satisfying the business requirements. This report also
highlights the necessity for the implementation of the CRM software that acts as a positive catalyst
Document Page
6Information Management System
thereby accelerating the business growth through the reduction in the errors and augmenting the
proficiency.
This report also highlights the hardware and the software requirements of an organization for
the continuation of the business procedures in the occasion of a disaster through the employment of
the BCDR software. This software imparts robustness to the system and makes the system capable of
enduring all the risks, threats, and work independently.
Further, this report depicts the implementation of the Enterprise Resource Planning for the
successful accomplishment of the business requirements of the organization through the expansion in
the domain of the operational activities of the organization and integrating the same. This report also
deciphers the role of the telecommunications in the infrastructure of the organization facilitating the
autonomous approach of the organization. Finally, the necessary mitigating techniques for the purpose
of combatting the hazards of the cyber-attacks are properly stated in the report.
Conclusion:
This report concludes that the vulnerabilities and the loopholes that are prevailing in the
infrastructure of the organization rendering hindrance in the way of accomplishment of the business
goals of the organization are successfully combatted through the intrusion of the above-mentioned
tools and software. These tools and software would equip the organization with the potentials that
would eventually empower them to overcome the thresholds and attain the business requirements that
in turn would be helpful in accomplishing the business objectives. However, there be the proper
provision for the mitigation techniques for enduring cyber threats.

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
7Information Management System
References
Costa, C. J., Ferreira, E., Bento, F., & Aparicio, M. (2016). Enterprise resource planning adoption and
satisfaction determinants. Computers in Human Behavior, 63, 659-671.
Felton, A., Gustafsson, L., Roberge, J. M., Ranius, T., Hjältén, J., Rudolphi, J., ... & Felton, A. M.
(2016). How climate change adaptation and mitigation strategies can threaten or enhance the
biodiversity of production forests: Insights from Sweden. Biological Conservation, 194, 11-
20.
Fitzgerald, B., & Stol, K. J. (2017). The future of software development methods. In The Routledge
Companion to Management Information Systems (pp. 125-137). Routledge.
Hansen, C., Xu, S., Gisin, B., & David, J. (2018, June). Using market optimization software to
develop a MISO multi-day market forecast. In FERC Technical Conference, AD10-12-009,
June.
Kim, M., Sudhir, K., Uetake, K., & Canales, R. (2016). Multidimensional sales incentives in CRM
settings: Customer adverse selection and moral hazard.
Kosinski, M., Wang, Y., Lakkaraju, H., & Leskovec, J. (2016). Mining big data to extract patterns and
predict real-life outcomes. Psychological methods, 21(4), 493.
MacKenzie, R., Marks, A., & Morgan, K. (2017). Technology, affordances and occupational identity
amongst older telecommunications engineers: From living machines to black-
boxes. Sociology, 51(4), 732-748.
Reicher, R., & Szeghegyi, Á. (2015). Factors affecting the selection and implementation of a
customer relationship management (CRM) process. Acta Polytechnica Hungarica, 12(4), 183-
200.
Singh, S. N., Kakkera, S., Kiu, L. I., & Sakala, P. (2016). U.S. Patent No. 9,324,119. Washington,
DC: U.S. Patent and Trademark Office.
Document Page
8Information Management System
Tarhini, A., Ammar, H., Tarhini, T., & Masa’deh, R. E. (2015). Analysis of the critical success factors
for enterprise resource planning implementation from stakeholders’ perspective: A systematic
review. International Business Research, 8(4), 25-40.
Zaharia, M., Xin, R. S., Wendell, P., Das, T., Armbrust, M., Dave, A., ... & Ghodsi, A. (2016).
Apache spark: a unified engine for big data processing. Communications of the ACM, 59(11),
56-65.
1 out of 9
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]