Get Instant Help From 5000+ Experts For
question

Writing: Get your essay and assignment written from scratch by PhD expert

Rewriting: Paraphrase or rewrite your friend's essay with similar meaning at reduced cost

Editing:Proofread your work by experts and improve grade at Lowest cost

And Improve Your Grades
myassignmenthelp.com
loader
Phone no. Missing!

Enter phone no. to receive critical updates and urgent messages !

Attach file

Error goes here

Files Missing!

Please upload all relevant files for quick & complete assistance.

Guaranteed Higher Grade!
Free Quote
wave
Definitions

Business Intelligence: Business intelligence can be defined as the collection of strategies, application, processes, technologies, data, and technical infrastructure.

IT Agility: IT agility is defined as rapid response given by the business system to enable sustainable configuration.

SWOT analysis: It is the structured planning method which is used for evaluating the strength, weaknesses, opportunities, and threats associated with the organization

Strategic planning: It is the direction given to take decision for allocating resources to enhance business operations.

Enterprise architecture: it is defined as the well-defined framework for analysis, designing, and implementation of the strategy.

Management information system: it focuses on providing efficiency to the strategic decision making process.

MIS and DSS: It provides support to the decision making activities.

Cloud infrastructure: it supports sharing of resources and other devices.

Data and text mining: Retrieval of high quality information

DMS: Document management system is used for tracking and storing of information.

Big data: Large complex data for data processing application

Key Performance Indicator

Advantages

Disadvantages

Change request comparison

It is the alternative solution to the proposed project. It can provide additional features in the project. The extension of services can be customized with the alternative solution

All the stakeholders associated with the project should agree on the addition of alternative solution. The change request proposal can come up with changing the hardware and software support

Change approval process

It facilitates the process of planning and implementation. It can helps in resolving the IT disruption issues. It is the systematic approach of handling the non-routing changes.

The priority should be given to the approval of the project proposal.

Inclusion of subservices in the incident

Facilitating the process of maintenance at the service module. The analysis of requirement can be easily carried out at sub-services. It helps in raising the satisfaction of the customers.

Lots of documentation is involved at each service module. It is a time consuming process.

Cost per contact

The comparison of relative cost of the services offered by different vendors helps in evaluating services at lowest price.

Loss of confidence and trust on the organization. It can raises the cost of advertising

Satisfaction of the customers

It helps in providing reviews and updates feedback. The satisfied customers help in giving benchmark result. It helps in getting knowledge about the efficiency of the organization to produce good quality product

Negative feedback from the customer can affect the reputation of the company. It is a time consuming process.

Utilization of the Agent

The agents help in developing valuable contact. It helps in improving the sale of the product.

The compensation fees should be given to the agents.

Satisfaction of the agent

It helps in improving the sale of the product.

The dissatisfaction in agents can affect the performance of the company.

Performance of the aggregate service desk

It helps in filling the gap for improving the quality of the product. It helps in identifying the strength and weakness of the organization

It can affect the working of the employees.

SaaS is the delivery model for the cloud computing technology in which the user is capable of accessing resources by using the thin cloud and web browser. “Saas is used for the implementation of software used for messaging, minimize the internal responsibilities of the employees, and increases the scalability and flexibility of the project” (Walton, 2013). SaaS is used to host the application by the service provider. The central database is hosted on the cloud for proposing the model for on demand software.

Advantages of SaaS:

  • Cheap: The business functionality can be accessed at lowest price by the implementation of SaaS. The subscription fees have to be paid for monthly or yearly basis.
  • Requirement of Less hardware: The SaaS involves the remote hosting of the application which does not require any additional cost to be spent on the implementation of hardware. It provides horizontal scaling for the installation of application on multiple devices.
  • Minimize maintenance cost: No extra requirement of hardware minimize the problem of maintenance. SaaS provides easier administration of number of users associate with the application.
  • Agility and rapid implementation: “The rapid implementation of application with the available resources of the enterprise” (Rumburg, 2013). 

Disadvantages of SaaS:

  • Security problem: “The storing of the data on the cloud creates major security issue because it can be accessed by any user for his use” (Sun, 2013). The information on the cloud is not kept confidential.
  • Latency Problem: “The information is stored on the cloud therefore the time of accessing the information gets increased from the traditional method of storing information” (Monstert, 2012).
  • SaaS application depends on the internet: The transaction of the application takes place through high speed internet connection. The high speed broad band should be indulge for sharing of resources through SaaS cloud computing.
  • Compliance: The requirement of the business should be comply with storing of data on the cloud.
  • Performance: “The performance of the application can be affected by the connectivity of internet” (Perkins, 2015). The steps should be taken to enhance the speed of the internet for the effective working of the application.

From the research and analysis, it has been concluded that following are the risks which are associated with the business continuity by virtualization:

Risk of environmental security: The security threats which are associated with the availability of resources to the users. The size of the resources can be affected by the malware and brute-force attacks.

Risk associated with data privacy: The loss of privacy of the confidential data can occur in the transmission of data between different vendors.

Availability of data: The vulnerability can occur in accessing data due to poor connectivity of internet.

Requirement for record retention: The requirement of record retention should be clear to the cloud providers.

Recovery from disaster: The recovery plan should be developed for hosting the resources over the cloud.

Impact of IT infrastructure on competitive advantage:

The IT infrastructure plays an important role in keeping ahead of the competitors. From the research on Liberty wines, it has been concluded that IT infrastructure facilitates top management in taking decision for uplifting the productivity of the organization. “It helps in providing new opportunities for carrying out communication with different stakeholders” (Apostu, 2015). The implementation of new technologies such as mobile, cloud, and social networking helps the enterprise to remain ahead of their competitors. “The new strategic plan can be developed for achieving the business agenda” (Boorman, 2011).

“The virtual servers are capable of indulging own operating system for the working of the application” (Linthicum, 2014). It can helps in improving the performance of the Liberty wines organization. Server virtualization is a new technology for promoting multiple virtual servers by partitioning the physical server. “Every virtual server is equipped with new operating system and a set of applications” (Kumar, 2014). It helps in reducing the number of the physical server. “The total cost of the ownership can be increased by reducing the cost of hardware, software, operating system, and maintenance costs” (Hoseini, 2013). The availability of the data helps in increasing the productivity of Liberty wines organization with improved quality of service. “The implementation of virtualization helps in developing the testing environment for the efficient working of the virtual server” (Shacklett, 2015). It helps in providing new opportunities for carrying out communication with different stakeholders. The problem of failure of physical server can be overcome by indulging server virtualization in the enterprise. It provides horizontal scaling for the installation of application on multiple devices.

Information Technologies Key Performance Indicator with Advantages and Disadvantages

T”he financial crime enforcement network of United States works on providing security and safeguarding mechanism for financial data and associated system” (Khan, 2012). It works on providing facility to the bank secrecy act and anti-money laundering legislation. It takes step forward to report and record suspicious activity which took place in the financial system.

IT upgrades needed by Fincen to achieve the goal of the organization:

The efficiency of the Fincen can be improved by focusing on the internal and external operation performed by the organization. “The BSA data should be used for creating values to the customers” (Hang, 2015). The external parties should collaborate in different areas of experience and expertise. A secure and advance technology should be used for carrying out operational activities. “The IT upgrades involve the improvement in service, excellence, integrity, Accountability, objectivity, and community” (Buhalis, 2014). The upgrading of IT technologies is based on the principle of effectiveness and efficiency, the value created for all activities, the activities work on collaborative relationships, the financial transaction should be globally supported, and many others.

Factors affecting Financial Intelligence:

The financial intelligence works on collecting information on the financial affairs, nature and capabilities of costs, prediction of intension, enforcement of laws, and many more related activities. The aim of the financial intelligence is the identification of tax, money laundering, and others associated with the financial transactions Collection and analysis is the pillars of financial intelligence. The result of the financial analysis can be affected by the circumstances, influence, and facts. Financial intelligence helps in detecting the threats associated with the financial system by collecting relevant information from different sources for analysing the cause of the scenario.

Identification of patterns and relationship is critical for national security:

The national security is the phenomenon of securing the values of nation from external and internal threats. From the research and analysis, it has been concluded that the relationship between political, economic, military, environmental and society helps in bringing the new security pattern for the security of the nation. The complexity arises with the linking of the information between different information.  The micro and macro methodology have been adopted for overcoming the problem of national security. 

The data analytics is the part of digital forensics which is used for detecting the cause and factors for crime. The aim of the data analytics is to find the cause of fraud occurred in the society. The crime can be detected by studying the structure and format used for bringing communication between participating parties. The large volume of data is analysed in separate database. The different databases are combined to produce effective information. Queries, internal control on data, and processes are the key factors for analysing the data to detect the occurrence of fraud. The emphasis should be given on patterns and structure to detect fraudulent behaviour which can result into crime.

References:

Apostu, A. (2015). Study on advantages and disadvantages of cloud computing (1st ed.). Retrieved from https://pdfs.semanticscholar.org/da62/49af5e0df8ed36334b34c2f1010ed19c53f4.pdf

Boorman, J. (2012). Financial system abuse, financial crime, and money laundering (1st ed.). Retrieved from https://www.imf.org/external/np/ml/2001/eng/021201.pdf

Buhalis, M. (2014). Big data analytics (1st ed.). Retrieved from https://www.triforce.com.au/pdf/data-insights-peer-research-report.pdf

Hang, H. (2015). Software as a service (1st ed.). Retrieved from https://www.cs.colorado.edu/~kena/classes/5828/s12/presentation-materials/dibieogheneovohanghaojie.pdf

Hoseini, L. (2013). Advantages and disadvantages of adopting ERP system served as SaaS from the perspective of SaaS user (1st ed.). Retrieved from https://www.diva-portal.org/smash/get/diva2:647780/FULLTEXT01.pdf

Khan, S. (2012). Cloud based big data analytics- A survey of current research and future direction (1st ed.). Retrieved from https://arxiv.org/ftp/arxiv/papers/1508/1508.04733.pdf

Kumar, M. (2014). Software as a service for efficient cloud computing (1st ed.). Retrieved from https://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.677.5363&rep=rep1&type=pdf

Linthicum, D. (2014). Understanding the value of financial intelligence for cloud management (1st ed.). Retrieved from https://www.cloudcruiser.com/wp-content/uploads/2014/06/White-Paper-Financial-Analytics-for-Hybrid-IT.pdf

Monstert, D. (2012). Utilization of financial intelligence centre as a crime intelligence source (1st ed.). Retrieved from https://uir.unisa.ac.za/bitstream/handle/10500/9116/dissertation_mosterd_d.pdf?sequence=1

Perkins, S. (2015). Role of financial intelligence (1st ed.). Retrieved from https://pubdocs.worldbank.org/en/834721427730119379/AML-Module-2.pdf

Rumburg, J. (2013). The seven most important performance indicators for the service desk (1st ed.). Retrieved from https://www.thinkhdi.com/~/media/HDICorp/Files/Library-Archive/Rumburg_SevenKPIs.pdf

Shacklett, K. (2015). Data analytics and research findings (1st ed.). Retrieved from https://wiredspace.wits.ac.za/bitstream/handle/10539/1626/04Chapter4.pdf?sequence=8

Sun, Y. (2013). National security decision making: processes and challenges (1st ed.). Retrieved from https://www.brookings.edu/wp-content/uploads/2016/06/chinese-national-security-decisionmaking-sun-paper.pdf 

Walton, A. (2013). Financial intelligence uses (1st ed.). Retrieved from https://scholarcommons.usf.edu/cgi/viewcontent.cgi?article=1329&context=jss&sei-redir=1&referer=https://www.google.co.in/url%3Fsa%3Dt%26rct%3Dj%26q%3Dresearch%2520paper%2520pdf%2520on%2520financial%2520intelligence%26source%3Dweb%26cd%3D1%26cad%3Drja%26uact%3D8%26ved%3D0ahUKEwin88KJ7vHSAhVLFpQKHQZqA8IQFggZMAA%26url%3Dhttp%253A%252F%252Fscholarcommons.usf.edu%252Fcgi%252Fviewcontent.cgi%253Farticle%253D1329%2526context%253Djss%26usg%3DAFQjCNFPn1hP9Q6ea6nS48hMBA7dwPoR5w%26bvm%3Dbv.150729734,d.dGo#search=%22research%20paper%20pdf%20financial%20intelligence%22

Cite This Work

To export a reference to this article please select a referencing stye below:

My Assignment Help. (2022). Business Intelligence, IT Agility, SWOT Analysis, Strategic Planning, And More - Essay.. Retrieved from https://myassignmenthelp.com/free-samples/itc540-it-infrastructure-management/business-intelligence-file-H83EF4.html.

"Business Intelligence, IT Agility, SWOT Analysis, Strategic Planning, And More - Essay.." My Assignment Help, 2022, https://myassignmenthelp.com/free-samples/itc540-it-infrastructure-management/business-intelligence-file-H83EF4.html.

My Assignment Help (2022) Business Intelligence, IT Agility, SWOT Analysis, Strategic Planning, And More - Essay. [Online]. Available from: https://myassignmenthelp.com/free-samples/itc540-it-infrastructure-management/business-intelligence-file-H83EF4.html
[Accessed 24 April 2024].

My Assignment Help. 'Business Intelligence, IT Agility, SWOT Analysis, Strategic Planning, And More - Essay.' (My Assignment Help, 2022) <https://myassignmenthelp.com/free-samples/itc540-it-infrastructure-management/business-intelligence-file-H83EF4.html> accessed 24 April 2024.

My Assignment Help. Business Intelligence, IT Agility, SWOT Analysis, Strategic Planning, And More - Essay. [Internet]. My Assignment Help. 2022 [cited 24 April 2024]. Available from: https://myassignmenthelp.com/free-samples/itc540-it-infrastructure-management/business-intelligence-file-H83EF4.html.

Get instant help from 5000+ experts for
question

Writing: Get your essay and assignment written from scratch by PhD expert

Rewriting: Paraphrase or rewrite your friend's essay with similar meaning at reduced cost

Editing: Proofread your work by experts and improve grade at Lowest cost

loader
250 words
Phone no. Missing!

Enter phone no. to receive critical updates and urgent messages !

Attach file

Error goes here

Files Missing!

Please upload all relevant files for quick & complete assistance.

Plagiarism checker
Verify originality of an essay
essay
Generate unique essays in a jiffy
Plagiarism checker
Cite sources with ease
support
Whatsapp
callback
sales
sales chat
Whatsapp
callback
sales chat
close