Electronic Record Management (ERM) is a computer system or a group of computer programs that manage and store records (Penn & Pennix, 2017). The system captures and manages all records created by different applications within the organization. ERM is designed with control access protocols to guarantee integrity. ERM ensure easy sharing of information, speedy recovery, and reduce the costs of handling and maintaining data.
Business Intelligence and Analytic is the process by which algorithms are used to analyze business data to determine the relationship that exists between data and insights or metadata as an approach to making business decisions (Holsapple, Lee-Post, & Pakath, 2014). Business analytic involves all technologies that are used in collecting and analyzing data Business Intelligence focuses the process of making an informed business decision based on the data presented from BI.
Data and text mining are terms that are used simultaneously to refer to that act of exploring data to obtain important business insights. The distinction in data mining and text mining is that data mining extract data from data centers that are often structured whereas text mining derives high-quality data from unstructured data or text like from social media (Gandomi & Haider, 2015). Linguistic of statistical techniques are used in establishing trends and patterns from text and in data different algorithms are used.
Big data analytics and data discovery is the means of exploring large, big, complex and diverse information sets to uncover trend, patterns, correlations and information that can be used in making informed business decisions (Gandomi & Haider, 2015). Data discovery performs a limited depth as exploration as compared to data analytics.
Enterprise architecture is a design of the organization structure and operation processes on how it could best achieve its objectives. The organization analyse, design and execute change in all organization functions to achieve the desired business state and ensuring that the current and the future development align with the existing business strategies (Marosin, Zee, Ghanavati, & Sepideh, 2016).
Management Information System (MIS) is a computer database of organization information that is collected and analyzed to produce regular and special reports. The MIS is, therefore, an important decision-making tool (Laudon & Laudon, 2015). Management receives the reports and uses them to successfully support operation.
Data lifecycle are a series of steps that are involved in converting raw data to information. It involves all processes and policy that govern the creation and storage of information till it becomes obsolete. Therefore, it is an overview of all the steps in effective management and preservation of data. Data principles provide guidelines on access and use of data, by establishing access rights, responsibility and confidentiality. Data principles are meant to maintain the integrity of data and ensure availability (Ngai, Gunasekaran, Wamba, Akter, & Dubey, 2017).
Cloud computing, is a technique where different computing services are offered over the internet (Sun, Zhang, Xiong, & Zhu, 2014). An organization preferred to use share computing services rather than personalized resources. Rather than using localized servers, the organization decides to store, process and manage data using a network of remote servers.
Information or data is a crucial component in an effective decision-making process. In the past year, business decision-making process inhibited by a scarcity of data. With the advancement in technology and big data, the problem is no longer scarcity of data but the too much complex data. Data and text mining assist the organization to effectively manage big data to gain real-time insightful knowledge that assists in decision making. Now businesses have the potential to analyze large textual and structured internal and external data to gain knowledge and insight that was otherwise impossible. This data allows organizations to make a more informed decision and to gain a competitive advantage (Ngai, Gunasekaran, Wamba, Akter, & Dubey, 2017).
The most dominant challenge connected to cloud computing include security and trust. The cloud architecture or model is the main cause of alarm for data security. In cloud computing, data is stored in different resources, that is, different machines, servers and networks (Sun, Zhang, Xiong, & Zhu, 2014). The way the data is scattered rises security concerns. There are increased threats to unauthorized access, data loss and malicious attacks. Some cloud computing services do not offer adequate security measures and with the shared resources and the openness of the computing system, malicious attacks like phishing and social engineering are common than when an organization invest in local infrastructure.
Moreover, it has also become difficult for organizations to trust cloud computing services. Most businesses do not fill comfortable to store sensitive information outside their organization (Avram, 2014). Besides, organizations feel that they do not have full control over their resources. The limited trust has partly been contributed by the security concerns. The best way to gain the trust and confidence of clients will be ensuring data protection and security. With the increased access to resources, cloud computing organization should enact authorization protocols, to ensure that only authorized personnel gain access to data (Sun, Zhang, Xiong, & Zhu, 2014). The cloud computing providers need to ensure that they address security problems in their solution. Nevertheless, it is equally important for organizations to study the security policies before any commitment.
EIS was developed to present the executive with both internal and external data, and KPI (Key Performance Indicators) related to the needs of the organization.
The system provided a junk of irrelevant data and omitted relevant data needed in making management decisions. It was difficult for the executives to do an accurate comparison because the outputs were not standardized.
The problems with EIS arose because the reporting was not personalized and because the user interface was complicated.
The system was bettered by having data governance procedures and strategies that ensured organization-wide standardized data formats and that assisted in eliminating any inconsistency.
The new IT architecture made is effortless for the executives to modify records and reduce the cost and the time that was required to do the analysis. It also increased the utilization of EIS within the organization.
The benefits of data governance is that it enhance the decision-making process because the quality and consistency of data are guaranteed.
Processing in real-time allows the company to obtain time-sensitive information on the market change, competition activities and customer preferences required in making critical business decisions and in collaborative planning, forecasting and replenishing.
Coca-Cola attempted to establish a conducive customer experience by changing their data store from decentralized to centralized so that they could also increase sells. The centralized approach enables the organization to respect data sensitive data.
The trusted view of the data allows Coca-Cola to respond fast and correctly to the market situations.
The Black Book model is a decision model established by Coca-Cola to manage the marketing complexity of the orange juice. It allows the company to blend the orange juice to develop a product that is align with the market transitions.
The Black Book model permits Coca-Cola to plan for distribution in advance. The model also allows the company to quickly re-plan, to respond to changes in the environment.
Avram, M.-G. (2014). Advantages and challenges of adopting cloud computing from an enterprise perspective. Procedia Technology, 12, 529-534.
Gandomi, A., & Haider, M. (2015). Beyond the hype: Big data concepts, methods, and analytics. International Journal of Information Management, 35(2), 137-144.
Holsapple, C., Lee-Post, A., & Pakath, R. (2014). A unified foundation for business analytics. Decision Support Systems, 64, 130-141.
Laudon, K. C., & Laudon, P. J. (2015). Management information systems (Vol. 8). Prentice Hall.
Marosin, D., Zee, M. V., Ghanavati, & Sepideh. (2016). Formalizing and modeling enterprise architecture (EA) principles with goal-oriented requirements language (GRL). International Conference on Advanced Information Systems Engineering, 205-220.
Ngai, E. W., Gunasekaran, A., Wamba, F. S., Akter, S., & Dubey, R. (2017). Big data analytics in electronic markets. Electronic Markets, 27(3), 243-245.
Penn, I. A., & Pennix, G. B. (2017). Records management handbook. Routledge.
Sun, Y., Zhang, J., Xiong, Y., & Zhu, G. (2014). Data security and privacy in cloud computing. International Journal of Distributed Sensor Networks, 10(7).
To export a reference to this article please select a referencing stye below:
My Assignment Help. (2021). Data Management. Retrieved from https://myassignmenthelp.com/free-samples/2814ict-data-management/concept-of-electronic-records-management.html.
"Data Management." My Assignment Help, 2021, https://myassignmenthelp.com/free-samples/2814ict-data-management/concept-of-electronic-records-management.html.
My Assignment Help (2021) Data Management [Online]. Available from: https://myassignmenthelp.com/free-samples/2814ict-data-management/concept-of-electronic-records-management.html
[Accessed 18 April 2021].
My Assignment Help. 'Data Management' (My Assignment Help, 2021) <https://myassignmenthelp.com/free-samples/2814ict-data-management/concept-of-electronic-records-management.html> accessed 18 April 2021.
My Assignment Help. Data Management [Internet]. My Assignment Help. 2021 [cited 18 April 2021]. Available from: https://myassignmenthelp.com/free-samples/2814ict-data-management/concept-of-electronic-records-management.html.
Do you want to ease off the homework load? Avail the most affordable assignment service at MyAssignmenthelp.com to submit your tasks on time at schools and colleges. Our qualified experts provide math homework help to the students in distress. Our efficient math solvers offer on-time delivery with accurate results. You name the topics, and we provide the service. Math question solvers provide assistance with intricate questions on algebra, calculus, geometry etc. Rechecking is done from our end to assure the students with authentic results. You will find your grades soaring with our help.
Answer Evaluating the financial management strategies of the top four Australian banks i.e. Commonwealth, Westpac, ANZ, and NAB Research Topic Evaluating the financial management strategies of the top four Australian banks i.e. Commonwealth, Westpac, ANZ, and NAB Introduction This report will discuss several components such as research objectives, research motivation, and conceptual information about the research concepts, and research di...
Read MoreAnswer Introduction: Tasmanian Mountain Waters is an Australian company, based in Tasmania. The company exclusively sells bottled mineral water across Australia and plans to extend its business globally to increase its international presence. The companyaims to retain the pureness and natural quality of the bottled water which is collected from remote springs of freshwater in Tasmania. Tasmania with its plentiful supply of freshwater that is ...
Read MoreAnswer: Souq is an e-commerce platform that is owned by Amazon. It is one of the largest e-commerce platforms in arab world. In this report, I have considered myself as a global manager of marketing department. The business of souq is localized in Saudi Arabia, united arab and Egypt. It was suggested that business need to widespread in other countries rather than just in gulf region. This report covers the strategies through which Souq c...
Read MoreAnswer Introduction The principles of Corporations Act put the obligation on the company directors to release their duties, responsibilities and powers with the aim to act for the business interest of the companies. The underlying fact is that the directors need to discharge their duties and powers for maximizing the organizational wealth for the best interest of their shareholders (Tricker and Tricker 2015). However, the occurrence of some r...
Read MoreAnswer Overview of Red Rooster Red Rooster was founded in 1972 is a chain of Australian fast food restaurant that specializes in serving roast chicken. The first Red Rooster store was opened in 1972, in Perth suburb of Kelmscott, Western Australia (Lasek, Cercone and Saunders, 2016). There possess a wide range of products including half roasts, whole roasts, burgers, wraps, salads, desserts, beverages, promotions formerly including Cheese and...
Read MoreJust share requirement and get customized Solution.
Orders
Overall Rating
Experts
Our writers make sure that all orders are submitted, prior to the deadline.
Using reliable plagiarism detection software, Turnitin.com.We only provide customized 100 percent original papers.
Feel free to contact our assignment writing services any time via phone, email or live chat. If you are unable to calculate word count online, ask our customer executives.
Our writers can provide you professional writing assistance on any subject at any level.
Our best price guarantee ensures that the features we offer cannot be matched by any of the competitors.
Get all your documents checked for plagiarism or duplicacy with us.
Get different kinds of essays typed in minutes with clicks.
Calculate your semester grades and cumulative GPa with our GPA Calculator.
Balance any chemical equation in minutes just by entering the formula.
Calculate the number of words and number of pages of all your academic documents.
Our Mission Client Satisfaction
I got a very high mark and I am satisfied with the service provided this time. Thank you!
Australia
It was great. The paper got the details and the information I needed. It was good effort.
Australia
It was good. The assignment provided good details and I got the information I needed.
Australia
GOOD! The tutor is professional, responsible and patient. The reply was timely...................
Australia