Вы находитесь на странице: 1из 10

Assignment

Individual

D3392– Ir. Togar A. Napitupulu, MS., MSc., Ph.D

Session 5
Tobe SubmittedWeek (i+1)th

MGMT 8047–Advanced Topics in MIS


 Make summary of the second article discussed in class – not the one
discussed in depth or detail – in each session, maximum two pages.

 Provide comments, in particular how the article can be further


expanded or extended or applied to a different setting in order to write
another new article based on the article.

 You only need to do this for four (4) articles of your choice out of ten
(10) articles covered in all sessions.

 If you choose article from session i you should submit the summary in
session (i+1), the week after; except if the article is from session 10. For
this, you should submit the summary during exam period or submit to
the secretary at the 8th floor during exam period.

MGMT 8047–Advanced Topics in MIS


1. Big Data Analiytics And Operation
nowdays, big data is considered as capital. Think of some of the biggest technology
companies in the world. Most of the value they offer is from their data, which they
constantly analyze to offer better services and develop new products and features.

Recent technological breakthroughs have increased data storage and data backup,
making it easier and cheaper to save more data than ever before. By increasing large
volumes of data now cheaper and more accessible, you can make business decisions
that are more accurate and precise.

Finding value in big data is not just about the analysis process. This is a discovery
process that requires tangible analysis, restoring patterns, making assumptions, and
predicting data so that what you get can help make the right business decision.

Challenges in Developing Big Data Analytics


In almost all organizations, developing big data analytics is a big challenge. This
challenge is due to the large amount of data, diverse data formats (whether in
structured or unstructured data) from all parts of the organization and the various
ways used to combine, build and analyze data to get hidden patterns from data and get
useful information for users. The first challenge in developing big data analytics is
How to break down data to be able to access all of the organization's data stored in
different storage and even stored on different systems. The second big challenge is to
create a platform that can attract unstructured data as easily as pulling structured data.
This volume of data is so large that it is difficult to process it using traditional
database and software design methods.

MGMT 8047–Advanced Topics in MIS


in addition, the main challenges in handling big data and large workloads are
diversity and volume of data, the complexity of analytical workloads and workloads.
This can be seen in the information supply chain, the input in the information supply
chain consists of raw data needed for analysis. Over the last two decades almost all
business analytics have been created using structured data extracted from operational
systems and consolidated into a data warehouse. Big data increases dramatically in
terms of the amount of raw data and the diversity and volume of data needed for
analysis. The highest percentage is in the form of multi-structured data (to distinguish
it from structured data in operational data that is used to be entered in the data
warehouse). In most organizations, multi-structured data continues to increase in
number compared to structured data.

Big data can help you innovate with relationships between people, institutions,
entities, and processes and then determine new ways to use that new knowledge. You
can use data insights to improve decisions about financial and planning
considerations. Receive trends and what customers want in new products and
services. Big companies like Netflix and Procter & Gamble use big data to ask for
customers' desires. They use data by seeing how their customers use their products.
Based on these data, they will then develop new innovations for their products and
services. In addition, P&G also uses data and analysis from various channels such as
focus groups and social media. You can also use data to apply prices to your services
and products. You can do a lot with big data.

MGMT 8047–Advanced Topics in MIS


2. Big Data Analiytics And marketing

Enablers can be defined as tools and / or methodologies that, alone or in combination


with related technologies, provide a way to produce giant leaps in user performance
and capabilities.

In short they allow businesses to do things that could not be done before; or at least
do things in a cheaper and smarter way.

Enablers are factors that affect individuals and collect the function and performance
of object, but in this case the object is management of information system and
technology in companies that use COBIT 5 work.

COBIT 5 has 7 Enablers in the COBIT 5 work agreement, the 7 enablers are:
1. Principles, policies and frameworks, are means for translating desired behavior into
practice guidelines for daily management.
2. Process, describes a number of practices and activities organized to achieve certain
objectives and produce a number of outputs in support of the achievement of all IT-
related objectives.
3. The organizational structure, is a key decision-making entity in the company.
4. Culture, ethics and behavior of individuals and companies are often seen as a
limiting factor for success in governance and management activities.
5. Information is spread throughout all parts of the organization and also includes all
information generated and used in the company. Information is needed to keep the
organization running and well managed. However, at the operational level,
information is often considered as a result of company processes.

MGMT 8047–Advanced Topics in MIS


6. Services, infrastructure and applications including infrastructure, technology and
applications that provide information technology services and processes for
companies.
7. People, skills and competencies relate to people and are needed to complete all
successful activities and make appropriate decisions and take corrective actions.

Technology can be used as an 'enabler', which provides short-term benefits and


opportunities to develop new systems. However, usually, it can buy the same
technology, and any profits can be immediately nullified. Because new technology is
not enough, new information systems are developed, utilizing technology, so that it
can provide higher competitive value. Profit potential will depend on good and
exclusive new information systems that can change business processes for the better.

IS can also be an enabler of new business strategies, strategies that would be


impossible without the application of IT. Success in managing IS will maximize the
return of money invested in obtaining, processing and using information in an
organization, and allows the use of good strategies to gain competitive advantage or
to increase competitive protection.
ome businesses, mostly internet-based, require IS as the main enabler. For example e-
commerce systems for companies that want to sell on the internet. So IS becomes the
main capital in this matter.

MGMT 8047–Advanced Topics in MIS


3. IT Security and Risk Management

IT Security and Risk Management (Risk Management) is the process of taking risks,
assessing risks, and taking steps to minimize risks to control and guarantee risks
remain at an acceptable level. IT Risk Management seeks to protect confidentiality,
integrity and availability (CIA). Namely by minimizing the impact that might arise
which can have an impact on the confidentiality of information, data integrity in the
system, and the availability of system infrastructure

The main reason why organizations need to implement a risk management process is
to support the organization's mission and protect the organization's assets. In IT
security and Risk Management, it is closely related to how security is implemented in
an organization so that an understanding of the organization's business processes and
possible risks that affect business processes is required. Risk Management will
greatly help the organization's management to balance the impact of risks and costs
needed to minimize this risk.

In recent years, Cyber Security has made an increase due to increasing Cyber risk
with the size and number, and the level of influence on individuals, governments and
organizations. Most organizations that are aware of the dangers of cyber attacks now
regard Cyber Security as an important issue.

The cost for cyber has been increasing for some time, and it can take months for third
parties to obtain it depending on the type of attack. For example, APT (continued
threat continually) uses continuous hacking techniques to gain access to a computer
system and can stay inside for months before it can be discovered.

MGMT 8047–Advanced Topics in MIS


When discussing Risk Management, we naturally talk about uncertainty. We can take
the website server case. A server that has not been patched and is not yet protected on
the network has the potential to be compromised. If it might not happen today or it
might not happen tomorrow, but we know that there is definitely a possibility and it
can happen. Therefore our understanding of threats and vulnerabilities, how
dangerous they are, and how effective the measures used to secure them, must be
determined when evaluating possible threats and vulnerabilities.

IT security pretty much covers all of the types of security within a network, from
components like databases and cloud servers to applications and the users remotely
accessing the network. They all fall under the IT security umbrella.

Within this is another term to know information assurance. This means that any
important data won’t be lost or stolen in the event of an attack or a disaster whether
that’s a tornado wiping out a server center or hackers breaking into a database. It’s
commonly addressed with things like backups and offsite backup databases and rests
on three main pillars: confidentiality, integrity, and availability. These philosophies
carry over into every other aspect of security, whether it’s application security or
wireless security.

IT security experts (also, system administrators and network admins, which we’ll talk
about next) are one of the most important team members you can hire. They’re
responsible for the safety and security of all of a company’s hardware, software, and
assets, and regularly audit back-end systems to ensure they’re airtight. Through
security analysis, they can identify potential security problems and create “protect,
detect, and react” security plans.

MGMT 8047–Advanced Topics in MIS


4. Mobile and Ubiquitous Commerce
Online learning requires more self-discipline, and (surprise!) It will benefit your
students. Because no one is watching your students, they are required to self-
discipline. Therefore, your students really need to take time to learn, pay attention to
what they learn, and apply what they learn during the exam.

The results show that learning outcomes for online learners are comparable to
traditional students at the secondary school and university levels. In fact, many
leading universities now offer online courses.
Students do not need to spend time or resources to travel. With online learning, there
is no need to spend money on transportation. Students You can learn to use any
device with an Internet connection.

Clearly, When it comes to learning, a combination of different approaches and


methods work best, but neither of these alone can promise to provide optimal results.

Online learning is a great tool for someone who has a strong sense of self-discipline
and is able to study without the assistance of others, but for someone without these
skills, it is mostly useless as they might find it hard to motivate themselves to actually
sit down and study.

Other than being affected by the skills and preferences of learners, teaching methods
also get affected by the area being studied. For example, certain soft-skills like
business storytelling or conflict management would do much better in a collaborative
environment since nonverbal communication can often be a very important element
of the subject at hand.

MGMT 8047–Advanced Topics in MIS


Learning face to face offers many benefits, obviously. of course in the face-to-face
learning method is very beneficial for students and teachers because in the learning
method will make students more disciplined and the time presented in learning will
be more effective and efficient, behind the many benefits there is no doubt that the
method has its own shortcomings such as lack of social interaction between students
and tend to make students more nailed to technology, it would be nice if face-to-face
learning methods can be presented with traditional learning methods.

With online learning, this is a good choice, but it's amazing to combine some of the
strengths offered by face-to-face learning into the online environment. Doing so
changes the online learning experience of a child who just sits in front of a computer
reading, pushes him to a place where they still have the freedom to learn from home
and according to their schedule, but are also taught and led by a direct expert who
lives in the place

This is where the teacher and the student meet in a set place for a set time, for either
one-on-one learning or, most commonly, in group class lessons similar to what
happens in school. Face to face learning is a really effective way to learn knowledge
and skills because it often combines different ways of learning including writing,
reading, discussion, presentations, projects, group work, film clips, demonstration and
practice.

MGMT 8047–Advanced Topics in MIS

Вам также может понравиться