Information Systems Management and Strategy Report 2022

Verified

Added on  2022/10/01

|13
|3306
|26
AI Summary

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Running head: INFORMATION SYSTEMS MANAGEMENT AND STRATEGY
Information Systems Management and Strategy
Name of Student-
Name of University-
Author’s Note-

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1INFORMATION SYSTEMS MANAGEMENT AND STRATEGY
Table of Contents
Introduction......................................................................................................................................1
Outline of Current Information system architecture........................................................................1
Future Desired Architecture............................................................................................................3
Strategies to transform the present architecture...............................................................................4
Reflection on processes used...........................................................................................................7
Bibliography..................................................................................................................................10
Document Page
2INFORMATION SYSTEMS MANAGEMENT AND STRATEGY
Introduction
With the advancement in technology, there is increase in data with every system and
technologies that are being used in every day being that of smartphone or might be tablets. The
improvement in internet connectivity have also lead to increase in data mining with the economic
as well as social value personal data increasing. There is an increase in the data value that has
dubbed the informational capitalism or is sometimes known as surveillance capitalism.
Under the model of surveillance capitalism, the creation of value of actually based to
extract the much possible data that are related with the users that turns down the data in
behavioral profiles and those profiles are them monetized via internal use or the data are then
sold to the third parties (Bondar et al. 2017). There is a tools known as personal data
management system that helps to secure the data that are used in daily life. This includes
gathering of data, managing of data as well as using the personal data that helps to control the
individual data so that their identity and privacy preferences can be kept.
Outline of Current Information system architecture
The present data is managed through personal information managing system that helps to
store the data, by allowing people so that they can control their personal data as well as helps to
manage all their identity. This helps to gather the data, store data, update date as well as helps to
share the data that are personal. This also includes the user to provide or deny access to other
parties whether they would be able to get access of their personal data. The devices that is used
in daily life includes a smartphone, a notebook, hard disk, smart watch, laptop, and a pen drive of
32 GB.
Document Page
3INFORMATION SYSTEMS MANAGEMENT AND STRATEGY
The tool of personal management helps to facilitate the compliance which includes
privacy laws that helps to take more user consent. Personal management of data also facilitate
the user right so that the individual data as well as business can ensure the data is kept updated.
The process to managing personal data with personal management are actually divided in
two categories divided in two technical architecture. This helps to store the data online. This
includes local storage and a cloud storage model. Using the local storage system of data
management, the users keep the information on their devices such as their laptops or the devices
they use. And in the cloud based system, the information is generally stored in a particular
location or in different service providers that are linked logically (Lapalme et al. 2016). The
personal data that are used in the system are to be encrypted, should include format that machine
can read and will also have to establish interactions without any human help. The interoperability
is known as absolute requirement that helps to widespread the using the storage management tool
as well as helps to create simple, and a common format so that the data files can be moved
securely between the services.
The function that is included in the storage system includes consent management in
which the preferences of the user are matched with the personal data. This can be explained as
for all the storing systems includes blockchain as well as functionality of smart contract helps in
facilitating the protection of data so that the age requirement of the user can be meet instead of
checking the user’s birth date. This can be further explained by taking an example of assistance
program which distributes the sexual orientation. The tool used for storing personal data helps to
confirm all individual meets some of the specific requirements for the purpose of eligibility. This
also helps to protect the individual from discrimination as because identity can be kept secret.

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
4INFORMATION SYSTEMS MANAGEMENT AND STRATEGY
The software tool of storing data needs in displaying the complex information using the
identity of user, consent of the user as well as the preferences of privacy is to be simple and
should help to display as well as inform the attempts so that the individual data can be accessed.
Future Desired Architecture
For organizing the personal data of an individual, enterprise architecture framework can
be used that includes process, or any methodology that helps in creating as well as using the
enterprise architecture. The EA architecture provides its user with comprehensive approach as
well as provides holistic approach to organize the IT throughout the data storage (Iyamu 2018).
As the data that are generated in present time by an individual is greatly dependent on the
technology for storing as well as collaborating the data, the framework of EA provides the user
to do all such activities. EA can be used by an individual for organizing the personal data as
because this architecture helps to organize the data as per business process and enhance the result
of the individuals.
The enterprise architecture includes a discipline that helps to evolve the business
structure as well as includes the IT alignment in the system. The framework that can be used in
the system is Zachman Framework. This is an ontology enterprise as well as a fundamental
structure that are used as enterprise architecture. This provides a particular way to view the
enterprise as well as the information system from other perspectives and shows how components
of the system are connected with each other.
Zachman framework can be used for organizing the personal data of an individual. This
framework includes to classify the architecture of the system that is being carried out in
organizing the personal data (Danny, Wang, and Alianto 2018). This framework is considered as
Document Page
5INFORMATION SYSTEMS MANAGEMENT AND STRATEGY
a business tool that helps to model the existing function that are already taking place in the
system and also includes the elements and the processes that are included in the system to
manage the change. The framework that is used for organizing the personal data also helps to
manage the change. This framework when used in organizing the data mainly experience the
change management that can take place in the system.
The Zachman framework includes two dimensional scheme that represents the enterprise
as matrix of 36 cells. Each of the cell in the framework focuses on one of the dimension or the
perspective that are included in the enterprise. The rows in the matrix are stated as the
viewpoints that are included in the process of developing the system. The columns in the matrix
helps to represent different perspectives of all the stakeholders that are involved with the system.
Strategies to transform the present architecture
The strategies that can be taken to change the present personal management architecture
to a Zachman framework is implementing the security management for providing the
information while following some constraints. The constraints includes the requirement of the
users, the financial responsibilities that are included in the system as well as the limitations that
are imposed by implementing the regulation.
The first column in the matrix includes the detailed planning process that states the list
containing the data. This data affects direction as well as purpose of enterprise and those are to b
secured depending on the level strength of the foundation. This helps to integrate the supporting
structure of the building (Abbas et al. 2018). This system should also ensure the proper
information level as this helps to build the scope and also helps to build all other rows that are
included in the framework. The data in the first column are to be secured stating their sensitivity
Document Page
6INFORMATION SYSTEMS MANAGEMENT AND STRATEGY
level. Data that are included in the cell are the data stored in different systems, the different
components that are used and all data that are related with the personal information of the user.
The second column helps to include all the processes that includes the operations that are
being taken place, all manufacturing details, the legal need that are to be secured as well as
includes processes that includes cross-functional processes so that it can be oversee as well as
helps to interconnect the processes that are included in the system.
There is also column three that helps in addressing the enterprise location. This includes
all the system that are connected with the main system, the vendor connections as well as all
third party authority as well as partners that are associated with the system. The third column
also includes the service providers that also includes carriers as well as entities that include
special attention regarding the governmental policies.
There is also column four that indicates the enterprise location. This fourth column also
includes corporate connection from the headquarters, the regional offices as well as the national
offices. This also includes the vendor connections that is all the third party as well as authority
partners that are accessed in the data (Aginsa, Edward, and Shalannanda 2016). The fourth
column consist of different departments of enterprises as well as includes network accessibility.
There are different departments including all the data r information stored in different devices.
There is also a threat of security in the system as there are more number of access points so that
it can extent the data storage in the system.
The fifth column of the Zachman framework contains the lists of events, the time
sequencing of all the processes as well as flows that are significant in storing the data of the
different storage systems. This fifth column includes planning cycle of business processing, the

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
7INFORMATION SYSTEMS MANAGEMENT AND STRATEGY
contingency planning of the system, strategic planning as well as fluctuations or changes that
happens in the market.
There is also a sixth column in the matric of Zachman framework. This sixth column
helps in addressing all external requirements as well as the constraints that are faced by the
enterprise. There are also external requirements that includes regulatory compliances, the
technological restrictions, the privacy regulations as well as security that are included in the
system. Two main constraints are included in the system that is the time constraint and the
funding constraint.
The enterprise model that will be used for improving the storage system and arranging
system of the personal data is the process model of the process that is being taken place. The
individual using the data storage and the information is the only recipient of the service that is
provided by the Zachman Framework (Asefzadeh, and Navvabi, 2017). The information
regarding the service is stated by the owner and the usage with the service are also to be
specified by the owner. The Zachman framework also includes conceptual model that helps the
owner to specify all such constraints that are included in the system.
The first column states the list of data that the owner wants to organize. This helps to
classify data as per the security level as per the confidentiality level. The integrity as well as
availability of data is ensured by the owner by keeping a backup of the data. One of the process
that helps to keep the track of the data is the data auditing model.
Colum two specifies the process that is carried out by the user or the owner. This model
helps to build all input data classified that produces output depending on market triggers that are
actually applied on the process. They are classified as per the criticalness of the system.
Document Page
8INFORMATION SYSTEMS MANAGEMENT AND STRATEGY
In column three, there is location of business or the process where the system will be
used. There should be a connection between the modes that helps in forming data, logistics as
well as voice of the system (Kluza et al. 2018). The information transfer actually takes place in
the nodes so that the security level is kept high.
The fourth column states the distribution of the authority as well as includes
responsibility of human resources that comes within the working process of the user. The fourth
column helps in providing all the information that are included in the desired flow that helps to
outline characteristics that are under process.
The column five indicates the time dimension that are included in completing the work.
There are two forms that are included in the time dimension. One of the forms helps in
representing the point of time and other defines the period the work that is being defined. There
are business cycles that include corporate calendar, the demand lifecycle and an information of
balance sheet.
The sixth column defines lastly defines the corporate ethics, helps to play a central role
included in the user decisions. All the policies that are included in the government, pending
logistics as well as industrial standards that are included in the constraints of the process.
Reflection on processes used
The security that is being included actually requires proper monitoring, the updates, the
researches, investment as well as includes implementing process of all new technologies that are
being invented. From the above discussion it can be said that the framework of Zachman is
actually based on open architecture that helps in ensuring all the solutions that helps in extending
the security policy of the system that is being used (Wu, Zhang, and Dong 2017). This
Document Page
9INFORMATION SYSTEMS MANAGEMENT AND STRATEGY
framework best works when it needed to plan the security of the architecture. This includes
evolving all the changes that the technology included in the Zachman framework.
It can be concluded that for using the Zachman framework, certain rules are to be
followed. The framework mainly offers some descriptive representation set or models that helps
to describe the processes that are being used. The rules that are to be followed are: each cell in
the framework is to be aligned with a cell that comes immediately above it or below it. Secondly,
all the cells in the row are to be aligned with one another. The cells in the framework are to be
unique and lastly, combination of the cells in a particular row helps to form complete description
of work that is being processes.
From the above discussion, it can be stated that for improving the process of managing
the storage system of personal data, this framework can be used as because this framework is a
visual aid that helps to organize all the ideas that are related with the enterprise technology
(Freitas et al. 2019). The IT experts mainly explains the framework as ontology that are stated in
a matrix. The Zachman framework mainly provides structured as well as disciplined so that the
working process can be defined. The Zachman framework is explained as matrix representation
that includes six rows and six column.
The first step for applying Zachman framework includes that the matrix is to be properly
made so that the security of the system of the process is maintained properly. The location field
in the system helps to select a particular model as well as store that diagram. This framework is
different from the other processes of data management because this framework arranges the
processes in points that includes all different players rather than representing the processes that
series of steps in traditional approach (Smith, Whittington, and Hodgson 2015). This helps the
organizations to organize the working process in effective way and helps to complete the process

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
10INFORMATION SYSTEMS MANAGEMENT AND STRATEGY
of development and fulfill the need of the organization. The architecture is mainly classified
using the Zachman framework and as this is a proactive tool, that can be used for modelling the
functions that takes place in the organization.
Document Page
11INFORMATION SYSTEMS MANAGEMENT AND STRATEGY
Bibliography
Abbas, W.F., Ismail, S.H., Haron, H. and Hariri, W.N.A.W., 2018. Enterprise Integration of
Employee Onboarding Process Using Zachman Framework. International Journal of
Engineering & Technology, 7(4.31), pp.46-51.
Aginsa, A., Edward, I.Y.M. and Shalannanda, W., 2016, August. Enhanced information security
management system framework design using ISO 27001 and zachman framework-A study case
of XYZ company. In 2016 2nd International Conference on Wireless and Telematics
(ICWT) (pp. 62-66). IEEE.
Asefzadeh, S. and Navvabi, E., 2017. Determination of gap in accreditation standards
establishment process using Zachman framework at a health-educational hospital. Biotechnology
and Health Sciences, 4(2).
Bondar, S., Hsu, J.C., Pfouga, A. and Stjepandić, J., 2017. Agile digital transformation of
System-of-Systems architecture models using Zachman framework. Journal of Industrial
Information Integration, 7, pp.33-43.
Danny, J., Wang, G. and Alianto, H., 2018, September. The Application of Zachman Framework
in Improving Better Decision Making. In 2018 Indonesian Association for Pattern Recognition
International Conference (INAPR) (pp. 245-249). IEEE.
Freitas, P.S., Dargam, F., Ribeiro, R., Moreno, J.M. and Papathanasiou, J., 2019, May. A
Conceptual Framework for an Integrated Information System to enhance Urban Mobility.
In EmC-ICDSST 2019 5 th International Conference on Decision Support System Technology–
ICDSST 2019 & EURO Mini Conference 2019 on “Decision Support Systems: Main.
Document Page
12INFORMATION SYSTEMS MANAGEMENT AND STRATEGY
Iyamu, T., 2018. Implementation of the enterprise architecture through the Zachman
Framework. Journal of Systems and Information Technology, 20(1), pp.2-18.
Kluza, K., Wiśniewski, P., Ligęza, A., Suchenia, A. and Wyrobek, J., 2018, June. Knowledge
Representation in Model Driven Approach in Terms of the Zachman Framework.
In International Conference on Artificial Intelligence and Soft Computing (pp. 689-699).
Springer, Cham.
Lapalme, J., Gerber, A., Van der Merwe, A., Zachman, J., De Vries, M. and Hinkelmann, K.,
2016. Exploring the future of enterprise architecture: A Zachman perspective. Computers in
Industry, 79, pp.103-113.
Smith, S., Whittington, D. and Hodgson, S., Mood Enterprises Ltd, 2015. Organization
representation framework and design method. U.S. Patent 8,930,853.
Wu, C., Zhang, Y. and Dong, Y., 2017, August. Application Research on Network Attacks and
Defenses with Zachman Framework. In International Conference on Network and System
Security (pp. 439-449). Springer, Cham.
1 out of 13
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]