IT Infrastructure Management: ERM, Business Intelligence, Cloud Computing, and More
VerifiedAdded on 2023/06/08
|11
|1585
|92
AI Summary
This article discusses various aspects of IT infrastructure management, including electronic records management, business intelligence, cloud computing, data and text mining, and more. It also covers the business value of data and text mining, threats related to cloud computing, and benefits of EIS and data governance.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running head: IT INFRASTRUCTURE MANAGEMENT
IT INFRASTRUCTURE MANAGEMENT
Name of student:
Name of university:
Author’s note:
IT INFRASTRUCTURE MANAGEMENT
Name of student:
Name of university:
Author’s note:
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
1IT INFRASTRUCTURE MANAGEMENT
Answer to question 1:
Electronic records management: Electronic Records Management (ERM) refers to
the management field that is accountable for the systematic and efficient control of formation,
reception, and maintenance of information evidence about activities of a business in the
method of records (Mukred & Yusof, 2015).
Business intelligence and Business analytics: Business intelligence refers to a
technology-focussed process that is used for analysing data and present actionable
information, which helps the managers, executives and other end-users of an organisation to
make educated business decisions (Loya & Carden, 2017).
Business analytics or BA determines the practices, tools and skills that are required
for unceasing iterative examination and exploration of past performance of a business to
drive planning of business and gain insight.
Data and text mining: Text and data mining refers to the process of developing high-
quality evidence from text. Statistical learning of pattern is used to devise trends and patterns
using which, high quality facts is derived (Witten et al., 2016).
Big data analytics and data discovery: Big data analytics denotes to the practice of
inspecting large and diverse data sets for uncovering concealed patterns, unfamiliar
relationships, market developments, preferences of customers and various other important
information that might assist organisations in making more educated business decisions.
Data discovery is the method of extracting important and meaningful information
from visual data by artificial intelligence systems and humans.
Answer to question 1:
Electronic records management: Electronic Records Management (ERM) refers to
the management field that is accountable for the systematic and efficient control of formation,
reception, and maintenance of information evidence about activities of a business in the
method of records (Mukred & Yusof, 2015).
Business intelligence and Business analytics: Business intelligence refers to a
technology-focussed process that is used for analysing data and present actionable
information, which helps the managers, executives and other end-users of an organisation to
make educated business decisions (Loya & Carden, 2017).
Business analytics or BA determines the practices, tools and skills that are required
for unceasing iterative examination and exploration of past performance of a business to
drive planning of business and gain insight.
Data and text mining: Text and data mining refers to the process of developing high-
quality evidence from text. Statistical learning of pattern is used to devise trends and patterns
using which, high quality facts is derived (Witten et al., 2016).
Big data analytics and data discovery: Big data analytics denotes to the practice of
inspecting large and diverse data sets for uncovering concealed patterns, unfamiliar
relationships, market developments, preferences of customers and various other important
information that might assist organisations in making more educated business decisions.
Data discovery is the method of extracting important and meaningful information
from visual data by artificial intelligence systems and humans.
2IT INFRASTRUCTURE MANAGEMENT
Enterprise architecture: EA or Enterprise Architecture is the detailed method of
guiding enterprise analysis, forecasting, plan, and execution, using a broad methodology at all
stretches for the effective growth and implementation of strategy (Lankhorst, 2013).
Management information system: This kind of information system is an organised
and programmed financial information database, which assists an organisation by producing
regular operation reports of every management level of the company (Laudon & Laudon,
2015).
Data life cycle and data principles: The structure of stages involved in the process
of data generation to the data execution or deletion is referred as the data life cycle of the
data.
Data principles are generally categorised as FAIR data principles (Findable,
Interoperable, Accessible, Reusable). Data principles are important as they support
information discovery and improvement, support the integration of knowledge and data.
Cloud computing: Cloud computing enables abundant access to mutual centres of
configurable resources and high-level services, which can be swiftly provisioned with
minimum management effort over the internet (Dinh et al., 2013).
Answer to question 2:
Business value of an organisation refers to all value forms that determines the
condition and well-being of the company in the future. Data and text mining imparts several
values for a business such as process efficiencies, effectiveness, cost reduction, real-time
decisions and increased revenue.
Answer to question 3:
Enterprise architecture: EA or Enterprise Architecture is the detailed method of
guiding enterprise analysis, forecasting, plan, and execution, using a broad methodology at all
stretches for the effective growth and implementation of strategy (Lankhorst, 2013).
Management information system: This kind of information system is an organised
and programmed financial information database, which assists an organisation by producing
regular operation reports of every management level of the company (Laudon & Laudon,
2015).
Data life cycle and data principles: The structure of stages involved in the process
of data generation to the data execution or deletion is referred as the data life cycle of the
data.
Data principles are generally categorised as FAIR data principles (Findable,
Interoperable, Accessible, Reusable). Data principles are important as they support
information discovery and improvement, support the integration of knowledge and data.
Cloud computing: Cloud computing enables abundant access to mutual centres of
configurable resources and high-level services, which can be swiftly provisioned with
minimum management effort over the internet (Dinh et al., 2013).
Answer to question 2:
Business value of an organisation refers to all value forms that determines the
condition and well-being of the company in the future. Data and text mining imparts several
values for a business such as process efficiencies, effectiveness, cost reduction, real-time
decisions and increased revenue.
Answer to question 3:
3IT INFRASTRUCTURE MANAGEMENT
The threats related to cloud computing can be malicious insider, SQL injection,
domain hijacking and phishing or fraud.
Malicious insider: when the employees of an organisation is given access in the cloud
storage, there can be a threat of unauthorised user accessing the information of the
organisation. Security auditing and privileges planning can help in mitigating these kind of
threats.
SQL threats: These kind of threats are generated when an unauthorised user is able to
inject a SQL command in the cloud database of the organisation. It causes crashing or theft of
data and files. Removal of all the data that are rarely used can help in mitigating these threats.
Strict privileges control can also reduce these threats (Almorsy, Grundy & Müller, 2016).
Domain hijacking: When the domain of the user is changed or altered without the
awareness of the user, then the threat of domain hijacking rises. These hijacking allows an
unauthorised user to access the information stored in the database of cloud and it can also
create the possibility of any illegal activities in the cloud storage. EPP or Extensible
Provisioning Protocol provides an exclusive code to the authorised user to access the data and
thus helping in mitigating this threat (Avram, 2014).
Phishing or fraud: It causes the leak of username, passwords of data stored in cloud
storage of a legitimate user to an unauthorised user. Phishing is executed by sending an email
with a link of a website, which looks like an authentic website and when the user provides the
username and password in this website, the information gets transferred to the malicious user.
Spam-filters are common method of mitigating these threats.
Answer to question 4:
The threats related to cloud computing can be malicious insider, SQL injection,
domain hijacking and phishing or fraud.
Malicious insider: when the employees of an organisation is given access in the cloud
storage, there can be a threat of unauthorised user accessing the information of the
organisation. Security auditing and privileges planning can help in mitigating these kind of
threats.
SQL threats: These kind of threats are generated when an unauthorised user is able to
inject a SQL command in the cloud database of the organisation. It causes crashing or theft of
data and files. Removal of all the data that are rarely used can help in mitigating these threats.
Strict privileges control can also reduce these threats (Almorsy, Grundy & Müller, 2016).
Domain hijacking: When the domain of the user is changed or altered without the
awareness of the user, then the threat of domain hijacking rises. These hijacking allows an
unauthorised user to access the information stored in the database of cloud and it can also
create the possibility of any illegal activities in the cloud storage. EPP or Extensible
Provisioning Protocol provides an exclusive code to the authorised user to access the data and
thus helping in mitigating this threat (Avram, 2014).
Phishing or fraud: It causes the leak of username, passwords of data stored in cloud
storage of a legitimate user to an unauthorised user. Phishing is executed by sending an email
with a link of a website, which looks like an authentic website and when the user provides the
username and password in this website, the information gets transferred to the malicious user.
Spam-filters are common method of mitigating these threats.
Answer to question 4:
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
4IT INFRASTRUCTURE MANAGEMENT
EIS was designed and implemented in the system of the organisation to support the
executives of the organisation with swift and effective decision making. External information
and internal information that are relevant to organisational development are easily accessed
by the senior executives of the organisation.
The problems related to EIS that the executives faced in the organisation faced are:
1. Limited functionality
2. Quantification of benefits is difficult
3. The implementation cost is very high
4. System were slowly crashing
5. Security of data is minimised
Problems regarding EIS were mitigated by the CIO with the help of problem
clarification of the situations which were tackled by the EIS, consensus building, appropriate
systems were chosen that were most suitable for these problems, and effective planning.
The benefits of the new IT architecture are:
1. Vision development and implementation
2. Principle development and implementation
3. Areas with potential of saving cost were identified
The benefits of data governance are:
1. Consistent data creation
2. Data quality improvement
3. Effective and efficient data
4. Business planning improvement
Answer to question 5:
EIS was designed and implemented in the system of the organisation to support the
executives of the organisation with swift and effective decision making. External information
and internal information that are relevant to organisational development are easily accessed
by the senior executives of the organisation.
The problems related to EIS that the executives faced in the organisation faced are:
1. Limited functionality
2. Quantification of benefits is difficult
3. The implementation cost is very high
4. System were slowly crashing
5. Security of data is minimised
Problems regarding EIS were mitigated by the CIO with the help of problem
clarification of the situations which were tackled by the EIS, consensus building, appropriate
systems were chosen that were most suitable for these problems, and effective planning.
The benefits of the new IT architecture are:
1. Vision development and implementation
2. Principle development and implementation
3. Areas with potential of saving cost were identified
The benefits of data governance are:
1. Consistent data creation
2. Data quality improvement
3. Effective and efficient data
4. Business planning improvement
Answer to question 5:
5IT INFRASTRUCTURE MANAGEMENT
Real time POS data processing was required by the Coca-Cola Company to update the
inventory, provide all inventory history, and running transactions in real time. The POS data
processing in real time provides an insight on the dynamic pricing of the organisation.
Coca-Cola created favourable experiences for the customers by centralising the
database from a decentralised database. This helped in efficient integration of data and
accessing of data became easier. This helped the retail consumers to sell more products of
Coca-Cola, which led to increase in customer satisfaction.
The advantage of trusted data is that, with the analysis of trusted data will help in
supporting the operations and business strategies of the company and with the help of reliable
data, accurate and quick response to the market changes is possible for the company.
Black book model is an application that is created with Java and some revenue
analytics of outside firms. It combined various aspects of the global juice operations, which
helped the Coca-Cola company to understand the juice market and grow the company
business in the juice sector.
The benefits of Black Book model are:
1. Improvement of the organisation
2. Improvement of products
3. Increase in revenue
4. Reduction of costs
Real time POS data processing was required by the Coca-Cola Company to update the
inventory, provide all inventory history, and running transactions in real time. The POS data
processing in real time provides an insight on the dynamic pricing of the organisation.
Coca-Cola created favourable experiences for the customers by centralising the
database from a decentralised database. This helped in efficient integration of data and
accessing of data became easier. This helped the retail consumers to sell more products of
Coca-Cola, which led to increase in customer satisfaction.
The advantage of trusted data is that, with the analysis of trusted data will help in
supporting the operations and business strategies of the company and with the help of reliable
data, accurate and quick response to the market changes is possible for the company.
Black book model is an application that is created with Java and some revenue
analytics of outside firms. It combined various aspects of the global juice operations, which
helped the Coca-Cola company to understand the juice market and grow the company
business in the juice sector.
The benefits of Black Book model are:
1. Improvement of the organisation
2. Improvement of products
3. Increase in revenue
4. Reduction of costs
6IT INFRASTRUCTURE MANAGEMENT
References
Almorsy, M., Grundy, J., & Müller, I. (2016). An analysis of the cloud computing security
problem. arXiv preprint arXiv:1609.01107.
Avram, M. G. (2014). Advantages and challenges of adopting cloud computing from an
enterprise perspective. Procedia Technology, 12, 529-534.
Dinh, H. T., Lee, C., Niyato, D., & Wang, P. (2013). A survey of mobile cloud computing:
architecture, applications, and approaches. Wireless communications and mobile
computing, 13(18), 1587-1611.
Lankhorst, M. (2013). Enterprise Architecture at Work: Modelling, Communication and
Analysis (The Enterprise Engineering Series).
Laudon, K. C., & Laudon, J. P. (2015). Management information systems (Vol. 8). Prentice
Hall.
Loya, T., & Carden, G. (2017). Business intelligence and analytics. Higher Education
Strategy and Planning: A Professional Guide, 191.
Mukred, M., & Yusof, Z. M. (2015). The role of electronic records management (ERM) for
supporting decision making process in Yemeni higher professional Education (HPE):
A preliminary review. Jurnal teknologi, 73(2), 117-122.
Witten, I. H., Frank, E., Hall, M. A., & Pal, C. J. (2016). Data Mining: Practical machine
learning tools and techniques. Morgan Kaufmann.
References
Almorsy, M., Grundy, J., & Müller, I. (2016). An analysis of the cloud computing security
problem. arXiv preprint arXiv:1609.01107.
Avram, M. G. (2014). Advantages and challenges of adopting cloud computing from an
enterprise perspective. Procedia Technology, 12, 529-534.
Dinh, H. T., Lee, C., Niyato, D., & Wang, P. (2013). A survey of mobile cloud computing:
architecture, applications, and approaches. Wireless communications and mobile
computing, 13(18), 1587-1611.
Lankhorst, M. (2013). Enterprise Architecture at Work: Modelling, Communication and
Analysis (The Enterprise Engineering Series).
Laudon, K. C., & Laudon, J. P. (2015). Management information systems (Vol. 8). Prentice
Hall.
Loya, T., & Carden, G. (2017). Business intelligence and analytics. Higher Education
Strategy and Planning: A Professional Guide, 191.
Mukred, M., & Yusof, Z. M. (2015). The role of electronic records management (ERM) for
supporting decision making process in Yemeni higher professional Education (HPE):
A preliminary review. Jurnal teknologi, 73(2), 117-122.
Witten, I. H., Frank, E., Hall, M. A., & Pal, C. J. (2016). Data Mining: Practical machine
learning tools and techniques. Morgan Kaufmann.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
7IT INFRASTRUCTURE MANAGEMENT
8IT INFRASTRUCTURE MANAGEMENT
9IT INFRASTRUCTURE MANAGEMENT
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
10IT INFRASTRUCTURE MANAGEMENT
1 out of 11
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.