Wednesday, May 6, 2020

Define the Following Terminologies †Free Samples for Students

Questions: What business risks had Liberty Wines faced? Describe the IT upgrades and capabilities needed by FinCEN in order to achieve its mission? How did server virtualisation benefit Liberty Wines and the environment? Why is the ability to identify patterns and relationships critical to national security? Answers: Introducation Business intelligence (BI): it highlights the variety of the computer software, which is often used in the evaluation of a corporation in the raw data (Almklov Antonsen, 2014). The business intelligence is the discipline, which can be comprised of the numerous affiliated activities, which include the data mining, reporting as well as the analytical processing. IT Agility: It refers to the business terms, which is used frequently nowadays in order to measure how fast the business could respond to the opportunities or perhaps the threats. The information technology agility is how fast the information technology will deliver the required efficiency as well as the effectiveness (Almklov Antonsen, 2014). The more the alignment that exists between the business and the IT there will be more levels of agility for both would be achieved. SWOT analysis: This is a framework, which is used by the decision makers in order to ascertain if the project or perhaps the goal is worthy, pursuing and what are the requirements needed to make it successful (Laudon Laudon, 2004). The terms stands for the strengths, weaknesses, opportunities and the threats. Strategic planning: This is a strategy, which is used by the organization in order to explain on the technique or perhaps the direction they are taking especially when it comes to the allotment of the resources. Moreover, it is also focused on the control system that are significant in the execution of the strategy. Enterprise architecture: This is a system, which defines on the structure as well as the operation of the organization (Laudon Laudon, 2004). The significance of the enterprise architecture is to ascertain on how the organization could attain on their existence and the long-term objectives. Management information systems: This refers to the computerized information processing system, which are designed in order to support the activities of the company or perhaps the organizational management. MIS and DSS: The DDS have been formulated for the provision of analysis that is effective that is related to a given situation. On the other hand, MIS has been designed for the efficient processing of the data. Cloud infrastructure: It regards to the virtual infrastructure, which can be provided or even accessed via the network or maybe the internet. The on-demand service has been delivered to the model. Data and text mining: This is the technique for the delivery of the high-quality data from the text. It is significant to note that the quality of the details is derived through devising of design and the trends such as the statistical learning pattern. DMS: It is a program, which contain inform and is able to convert the data to individual storage container. Moreover, it has the capability of aggregating of this diverse data to consistent resource. Big data: these are usually the set of data that are large as well as complex in nature and the traditional processing software are not adequate to deal with it since there could be issues such as capture, analysis and storage. Question two The KPI are the measures which are quantifiable that are used to indicate the success of a company (Almklov Antonsen, 2014). Some of the major performance indicator in the information technology are the account create success, data Centre capacity consumed, the termination success of account and the client connection effectiveness. Advantages of the information technology of KPI The key performance indicator helps in the collection of the data from the separate tools useful in the different teams, which are combined in single of dashboard (Bianco, Boon, Rochon, Sherman, Sterling Ware, 2007). The key performance indicator helps in the creation of the benchmark within a given businesses. Individuals are able to see the quality of the business using the KPI. Disadvantages The key performance indicators provides the results on short term. The organization usually provides the atmosphere where the short earning become available than the aspect that cause them (Laudon Laudon, 2004). Question three SaaS refers to a software distribution model, which the third party providers host the program and making them to be available to the customers over the internet. Benefits of SaaS The software is associated with the lower costs: it has a differential when it comes to the costs as it resided on the environment that is shared. The software has a reduced time to the benefit since it is already installed and as the same time it is configured. There is scalability and the integration of the software since it reside in the cloud environment. Demerits There are security issues in regards to the software: the adoption of the cloud is generally to be able to access to the management and privacy of the sensitive information (Laudon Laudon, 2004). In case this information is breach, there can be catastrophic effect in the breach of the information of organization. There is issue of performance: The web-based program, which is accessed via the internet connection, could become a worrying aspect to the organization. Question 4 What business risks had Liberty Wines faced? The liberty wines underwent the risk of their current servers lacking the capacity in handling the increased data volume as well as the maintenance of the program as a result of the growth in the business. How does Liberty Wines IT infrastructure impact its competitive advantage? The liberty wines has influenced their competitive advantage via the reduction on the cost. This has been through the power, air conditioning along with the replacement of the numerous hardware. Other ways continues to be via the enhancement of the resilience along with the stability through the backup system (Laudon Laudon, 2004). The bottom line at that time was enhanced consequently the employees might offer much better services to the customers by means of the enhanced productivity. Moreover, it could be possible to enable business growth in the future at a faster rate. How did server virtualisation benefit Liberty Wines and the environment? The virtualization of the server benefited the organization largely. This was through reduction of the number of servers from ten which was the previous number to just four, of which one was the backup system. There was reduction on the cost of the power and the air-conditioning by 60% hence am improvement the bottom line and the reduction of the carbon footprint (Laudon Laudon, 2004). The programs worked much faster and there was better utilization, which led to better customer service and better inventory management. There was also cut in the cost of the replacement of the hardware by $ 69000. Question five The information that the financial business required to report to the FinCEN experienced what we relation as the sporadic of the quality as well as there was clearly the insufficient the validation as well as the standardization. When the FinCEN had attempted to perform evaluation on the data, they were limited to the small datasets and simple routines. This bureau was not able in undertaking the analysis through the massive data set as well as they lack the capabilities of the proactive analysis and the trend for prediction. When reporting was done to the agency, one used the offline system. As a result of this, it made the FinCEN agency be unable to detect any new emerging threats. FinCEN performed an upgrade on their analytic capabilities, on the IT system along with the databases. The upgrade analytics required to collect much better along with examine the data from the numerous sources and offer them to the federal state and local law enforcement in addition to regulatory authorities. The FinCEN analysts maintain enhanced on the analytic along with capabilities of examination. The databases were generally upgraded, where there was clearly conversion of eleven years of data from the legacy system to the FinCEN existing system of record. On account of the enhanced information technology infrastructure, FinCEN bears the functionality to receive electronically, method as well as store on the reports of the company. Moreover, FinCEN released the FinCEN query web based application an approach that is accessed by the analyst, the law enforcement, as well as the regulatory users who are providing the real time access to more than eleven years of the Bank secretary A ct data. The financial intelligence usually depends on the effective information analytics in order to identify on the patterns as well as the relationships, which reveal the potential to the activity that are illicit. The capability of recognizing on the designs is essential to the national security while they provide the unlawful actions Research recent financial crimes that FinCEN has detected and disrupted. Explain the role of data analytics in crime detection. The FinCEN had pointed out that a one million dollar penalty against the sparks nugget Inc. in Nevada. It violated on the AML provision of the BSA. The Casinos need to implement as well as maintain on the effective anti-money laundering program, in order to maintain on the records of various transactions as well as the reports of the files (Almklov Antonsen, 2014). These reports are important to the investigators to be able to anticipate on the crimes and be able to solve them. The company Spark nuggets violated on the requirements of the AML program. Such fraud is one of the challenge that the financial corporation are encountering (Almklov Antonsen, 2014). To be able to handle such crime the banks have implemented the behavior monitoring network analysis, and the pattern recognition in order to detect the crimes. The Big Data analytics are also useful in the detection of the frauds since they collects the data from various sources and then filter as well as analyze on the data th at is accurate. References Almklov, P. G., Antonsen, S. (2014). Making work invisible: new public management and operational work in critical infrastructure sectors. Public Administration, 92(2), 477-492. Bianco, P. G., Boon, W. T., Rochon, A. C., Sherman, M. A., Sterling, R. B., Ware, K. R. (2007). U.S. Patent No. 7,305,562. Washington, DC: U.S. Patent and Trademark Office. Ford, W., Baum, M. S. (2000). Secure electronic commerce: building the infrastructure for digital signatures and encryption. Prentice Hall PTR. Laudon, K. C., Laudon, J. P. (2004). Management information systems: Managing the digital firm. New Jersey, 8

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.