IT Infrastructure Management: ERM, Business Intelligence, Cloud Computing, and More
Verified
Added on 2023/06/08
|11
|1585
|92
AI Summary
This article discusses various aspects of IT infrastructure management, including electronic records management, business intelligence, cloud computing, data and text mining, and more. It also covers the business value of data and text mining, threats related to cloud computing, and benefits of EIS and data governance.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running head: IT INFRASTRUCTURE MANAGEMENT IT INFRASTRUCTURE MANAGEMENT Name of student: Name of university: Author’s note:
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
1IT INFRASTRUCTURE MANAGEMENT Answer to question 1: Electronic records management:Electronic Records Management (ERM) refers to the management field that is accountable for the systematic and efficient control of formation, reception, and maintenance of information evidence about activities of a business in the method of records (Mukred & Yusof, 2015). Business intelligence and Business analytics:Business intelligence refers to a technology-focussedprocessthatisusedforanalysingdataandpresentactionable information, which helps the managers, executives and other end-users of an organisation to make educated business decisions (Loya & Carden, 2017). Business analytics or BA determines the practices, tools and skills that are required for unceasing iterative examination and exploration of past performance of a business to drive planning of business and gain insight. Data and text mining:Text and data mining refers to the process of developing high- quality evidence from text. Statistical learning of pattern is used to devise trends and patterns using which, high quality facts is derived (Witten et al., 2016). Big data analytics and data discovery:Big data analytics denotes to the practice of inspectinglargeanddiversedatasetsforuncoveringconcealedpatterns,unfamiliar relationships, market developments, preferences of customers and various other important information that might assist organisations in making more educated business decisions. Data discovery is the method of extracting important and meaningful information from visual data by artificial intelligence systems and humans.
2IT INFRASTRUCTURE MANAGEMENT Enterprise architecture:EA or Enterprise Architecture is the detailed method of guiding enterprise analysis, forecasting, plan, and execution, using a broad methodology at all stretches for the effective growth and implementation of strategy (Lankhorst, 2013). Management information system:This kind of information system is an organised and programmed financial information database, which assists an organisation by producing regular operation reports of every management level of the company (Laudon & Laudon, 2015). Data life cycle and data principles:The structure of stages involved in the process of data generation to the data execution or deletion is referred as the data life cycle of the data. DataprinciplesaregenerallycategorisedasFAIRdataprinciples(Findable, Interoperable,Accessible,Reusable).Dataprinciplesareimportantastheysupport information discovery and improvement, support the integration of knowledge and data. Cloud computing:Cloud computing enables abundant access to mutual centres of configurable resources and high-level services, which can be swiftly provisioned with minimum management effort over the internet (Dinh et al., 2013). Answer to question 2: Business value of an organisation refers to all value forms that determines the condition and well-being of the company in the future. Data and text mining imparts several values for a business such as process efficiencies, effectiveness, cost reduction, real-time decisions and increased revenue. Answer to question 3:
3IT INFRASTRUCTURE MANAGEMENT The threats related to cloud computing can be malicious insider, SQL injection, domain hijacking and phishing or fraud. Malicious insider: when the employees of an organisation is given access in the cloud storage,therecanbeathreatofunauthoriseduseraccessingtheinformationofthe organisation. Security auditing and privileges planning can help in mitigating these kind of threats. SQL threats: These kind of threats are generated when an unauthorised user is able to inject a SQL command in the cloud database of the organisation. It causes crashing or theft of data and files. Removal of all the data that are rarely used can help in mitigating these threats. Strict privileges control can also reduce these threats (Almorsy, Grundy & Müller, 2016). Domain hijacking: When the domain of the user is changed or altered without the awareness of the user, then the threat of domain hijacking rises. These hijacking allows an unauthorised user to access the information stored in the database of cloud and it can also create the possibility of any illegal activities in the cloud storage. EPP or Extensible Provisioning Protocol provides an exclusive code to the authorised user to access the data and thus helping in mitigating this threat (Avram, 2014). Phishing or fraud: It causes the leak of username, passwords of data stored in cloud storage of a legitimate user to an unauthorised user. Phishing is executed by sending an email with a link of a website, which looks like an authentic website and when the user provides the username and password in this website, the information gets transferred to the malicious user. Spam-filters are common method of mitigating these threats. Answer to question 4:
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
4IT INFRASTRUCTURE MANAGEMENT EIS was designed and implemented in the system of the organisation to support the executives of the organisation with swift and effective decision making. External information and internal information that are relevant to organisational development are easily accessed by the senior executives of the organisation. The problems related to EIS that the executives faced in the organisation faced are: 1.Limited functionality 2.Quantification of benefits is difficult 3.The implementation cost is very high 4.System were slowly crashing 5.Security of data is minimised Problems regarding EIS were mitigated by the CIO with the help of problem clarification of the situations which were tackled by the EIS, consensus building, appropriate systems were chosen that were most suitable for these problems, and effective planning. The benefits of the new IT architecture are: 1.Vision development and implementation 2.Principle development and implementation 3.Areas with potential of saving cost were identified The benefits of data governance are: 1.Consistent data creation 2.Data quality improvement 3.Effective and efficient data 4.Business planning improvement Answer to question 5:
5IT INFRASTRUCTURE MANAGEMENT Real time POS data processing was required by the Coca-Cola Company to update the inventory, provide all inventory history, and running transactions in real time. The POS data processing in real time provides an insight on the dynamic pricing of the organisation. Coca-Cola created favourable experiences for the customers by centralising the database from a decentralised database. This helped in efficient integration of data and accessing of data became easier. This helped the retail consumers to sell more products of Coca-Cola, which led to increase in customer satisfaction. The advantage of trusted data is that, with the analysis of trusted data will help in supporting the operations and business strategies of the company and with the help of reliable data, accurate and quick response to the market changes is possible for the company. Black book model is an application that is created with Java and some revenue analytics of outside firms. It combined various aspects of the global juice operations, which helped the Coca-Cola company to understand the juice market and grow the company business in the juice sector. The benefits of Black Book model are: 1.Improvement of the organisation 2.Improvement of products 3.Increase in revenue 4.Reduction of costs
6IT INFRASTRUCTURE MANAGEMENT References Almorsy, M., Grundy, J., & Müller, I. (2016). An analysis of the cloud computing security problem.arXiv preprint arXiv:1609.01107. Avram, M. G. (2014). Advantages and challenges of adopting cloud computing from an enterprise perspective.Procedia Technology,12, 529-534. Dinh, H. T., Lee, C., Niyato, D., & Wang, P. (2013). A survey of mobile cloud computing: architecture,applications,andapproaches.Wirelesscommunicationsandmobile computing,13(18), 1587-1611. Lankhorst, M. (2013). Enterprise Architecture at Work: Modelling, Communication and Analysis (The Enterprise Engineering Series). Laudon, K. C., & Laudon, J. P. (2015).Management information systems(Vol. 8). Prentice Hall. Loya, T., & Carden, G. (2017). Business intelligence and analytics.Higher Education Strategy and Planning: A Professional Guide, 191. Mukred, M., & Yusof, Z. M. (2015). The role of electronic records management (ERM) for supporting decision making process in Yemeni higher professional Education (HPE): A preliminary review.Jurnal teknologi,73(2), 117-122. Witten, I. H., Frank, E., Hall, M. A., & Pal, C. J. (2016).Data Mining: Practical machine learning tools and techniques. Morgan Kaufmann.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.