Premium Essay

Information Analysis

In:

Submitted By sarahlo2142
Words 668
Pages 3
Information Systems Analysis

Sarah

07/12/2015

Information Technology (ITEC - 6111 - 3)

Abstract
Data is the most valuable enterprise asset, and a properly integrated data management strategy will enhance an organization’s ability to develop valuable insights that will provide greater business value. More specifically, data management is the development and execution of a company’s procedures, policies and architectures: in order to better manage its informational needs in an effective and efficient manner. Data warehousing, online transactional databases, and data mining can solve or reduce difficulties associated with managing data.

Solving Data Management Difficulties The concept of data warehousing is to create a central location and permanent storage space for the various data sources needed to support a company’s analysis and reporting. In other words, it is a database that focuses on query and analysis rather than actual transaction processing (Reeves, 2009). It usually contains historical data derived from a company’s transaction data, but may include data from several other sources. Data warehouses separate analysis workload from transaction workload and enable an organization to consolidate data from several sources. Since executives and managers can quickly and efficiently access data from a multiple sources, they are able to make informed decisions on key initiatives promptly: rather than waste time retrieving data from multiple sources. Another benefit of data warehousing is that it stores large amounts of historical data so it can be analyzed from different time periods in order to make future predictions for a company (Reeves, 2009). Online transaction processing is a class of systems that facilitates high transaction-oriented applications. Its primary system features are immediate client feedback and high individual transaction

Similar Documents

Premium Essay

Information Requirements Analysis

...Short Answer/Essay Questions Information Requirements Analysis 4/20/2014 SNHU Eddie Bailey A good questionnaire is one that enables collection of precise data in a well-timed manner. It facilitates the work of data gathering, data processing and the tabulation of data. It ensures that there is no collection of unneeded information. It permits complete and important analysis as well as purposeful utilization of the data composed. Random Sampling Advantages: Since it is done at chance, the whole process is evenhanded. This is good to use in less significant populations, of course it doesn't 100% protect from bias (depending on the question). But this option is a faster way of achieving information. Disadvantages: As I said before, depending on your question it cannot put a stop to bias. Also, if you are sampling information from a big population this will take too much time and patience. There is also no assurance that what these people say, represents what another group of people think. Non-Random Sampling Advantages: This is more precise because you are targeting a particular group, therefore your answers will be parallel to what the rest of the population (of this group) will answer. Disadvantages: This is more predisposed, because the individuals chosen are not at random. They also may not represent what another population thinks. According to Clark (2012) states that " Lead by Example; all facilitators must present an example to the participants...

Words: 375 - Pages: 2

Free Essay

Computer Information Systems Analysis and Design

...a. Consultant i. Frequently acts as a systems consultant to humans and their businesses and may be hired specifically to address information systems issues within a business. This can be advantageous because an analyst can bring a a fresh perspective that people within the organization may not possess. One disadvantage is that an analyst may never know the organizations true culture. b. Supporting Expert ii. An analyst may play a supporting expert from within the business. These analysts are employed by the company and have at least some capacity in the systems of the organization. The analyst would draw on professional expertise concerning computer hardware and software and their principle uses within the business. c. Agent of Change iii. This is the most comprehensive and responsible role. This role can be filled internal or external to the business. An analyst is an agent of change whenever he performs any of the activities in the systems development life cycle. The agent of change is also present and interacting with users and the business for an extended period. An agent of change is a person who serves as a catalyst for change, develops a plan for change, and works with others in facilitating that change. 2. Involving individuals with various perspectives in system analysis and design activities d. Identifying Problems, Opportunities, and Objectives iv. The systems analyst would involve individuals...

Words: 2328 - Pages: 10

Premium Essay

A Risk Analysis for Information Security and Infrastrucure Protection

...A Risk Analysis for Information Security and Infrastructure Protection Special Topics in Criminology and Criminal Justice Columbia Southern University January 03, 2012 A Risk Analysis for Information Security and Infrastructure Protection OBJECTIVE The sole purpose for performing a risk analysis for IT systems is to ensure businesses and or organizations, whether small or large to accomplish its missions by better securing the IT systems that store, process, or transmit organizational information. The primary function of risk analysis is to identify and correct the vulnerabilities and threats of an IT system. It enables management to make well-informed risk management decisions and justify the spending that is part of an IT budget. This also assists management in authorizing or accrediting the IT systems based on the performance results of a risk analysis. TARGET AUDIENCE Risk analysis will encompass a basic guide for experienced and inexperienced, technical and non-technical personnel who support or use risk analysis for their IT systems. This will included a detail listing and job description of personnel based on the National Institute of Standards and Technology (NIST) research: Senior management and mission owners make decisions about the IT security budget, and they ensure the implementation of risk management for agency systems and the security provided for the IT systems. The Designated Approving Authority (DAA) is responsible...

Words: 1308 - Pages: 6

Premium Essay

Information Systems Analysis for British Airways vs. Easyjet

...Information Systems Analysis: British Airways vs. EasyJet Name Institution Table of Contents Introduction 3 Main Body 4 Section 1: Information Requirements 5 Section 2: IT based Information Systems 8 Section 3: The Internet-based Information Systems 9 Conclusions 12 References 13 Introduction Information systems are particularly important for business establishments (Stair & Reynolds 2011). It is especially true for airline companies such British Airways (BA) and EasyJet. The nature and size of the two carriers operations ensure that they face particular challenges in communicating with all their stakeholders that include the shareholders, personnel, customers and suppliers. In fact, the need for the right information is made acute when it becomes apparent that the information is necessary to ensure control, coordination and decision-making support for the airline company. In response to that challenge, both BA and EasyJet have applied an extensive information management system that employs the most efficient and effective communication tools and strategies to transmit pertinent information (Google, 2013). For this reason, both BA and EasyJet have implemented an information system that uses the most efficient and effective communication tool – the Internet – to enable them transmit the right information to all their stakeholders. An information system refers to the data management approaches that a business entity applies. In the present time when...

Words: 3279 - Pages: 14

Free Essay

Case Analysis Case Analysis “Robert Princeton” Loginjoin Rss ©2012 Termpaperwarehouse.Com Privacy Policy Terms of Service Copyright Information Contact Us Help Advertise with Us

...Charlotte Beers (Ogilvy & Mather) Case analysis At the point of planning to the launch of the business, the owner of the business is very passionate and usually experienced in the line-of-business; as David Ogilvy was at the age of 38 when he started his own advertising agency in 1948. Ogilvy & Mather, an advertising agency was started in New York and expanded worldwide. By 1991, O&M was ranked the largest marketing company in the world.[1] But there comes a time when a company must look to adapt a change. With competition growing, clients of O&M changed their demands. O&M was a high-cost agency that was failing in controlling their budget and lowering their cost; they failed to see the reason for a change. Due to that fact, O&M had lost few of their multi-million dollar accounts. Many companies may have either filed bankruptcy or have shutdown in the process of losing their clients but O&M was not the type of company that would give up that easily. In 1992, Charlotte Beers was appointed CEO of O&M and a massive change was underway. She was not the type of person who would dwell on the past, but instead look to better the future. Charlotte Beers clearly made an impression on the O&M employees as she had the ability to inspire. But more importantly, she came up with three strategies which turned the company around 360 degrees; Client Security, Better Work/More Often, and Financial Discipline. Yes these strategies were formed for an advertising agency...

Words: 492 - Pages: 2

Premium Essay

Systems Informations Analysis

...CATWOE, Root Cause, & Rich Picture Question 1. Management commitment and communications The management teams leadership and communication, specifically wit the IT department, resulted in helping the Columbus Project fail. Had senior management clearly communicated from the start that the project was a survival issue, the results may have born strong leadership and follow through with the IT Department. C While the topic is an internal based investigation, I still see the end user as the customers of the bank. The Columbus Project was supposed to be overseen by the managers to primarily make banking easier and more accessible for their customers. The service was to be upgraded to instant, seamless, and efficient, with over 100 million invested towards customer satisfaction. A Management and IT played the most critical role in the communication process, or lack there of, for the implementation of the project. It was clear as to management’s level of involvement in a quote from an IT member, “My manager lets me set my own deadlines, he doesn’t understand what I do”. It showed Management lacked any IT savvy for a project of this magnitude. T The inputs in this scenario would be management’s commitments and communications to the IT team; and thus the out puts would be the results from the IT department that would drive the project forward. Hindrance in the output would be the example of de-scoping projects that were marked as critical by the IT team. W The view...

Words: 2090 - Pages: 9

Premium Essay

Information and Survey Analysis

...1. An IS auditor is reviewing access to an application to determine whether the 10 most recent "new user" forms were correctly authorized. This is an example of: A. variable sampling. B. substantive testing. C. compliance testing. D. stop-or-go sampling. The correct answer is: C. compliance testing. Explanation: Compliance testing determines whether controls are being applied in compliance with policy. This includes tests to determine whether new accounts were appropriately authorized. Variable sampling is used to estimate numerical values, such as dollar values. Substantive testing substantiates the integrity of actual processing, such as balances on financial statements. The development of substantive tests is often dependent on the outcome of compliance tests. If compliance tests indicate that there are adequate internal controls, then substantive tests can be minimized. Stop-or-go sampling allows a test to be stopped as early as possible and is not appropriate for checking whether procedures have been followed. 2. The decisions and actions of an IS auditor are MOST likely to affect which of the following risks? A. Inherent B. Detection C. Control D. Business The correct answer is: B. Detection Explanation: Detection risks are directly affected by the auditor's selection of audit procedures and techniques. Inherent risks usually are not affected by the IS auditor. Control risks are controlled by the actions of the company's management. Business...

Words: 97238 - Pages: 389

Premium Essay

Information Systems Analysis

...Modern information systems are designed not only for the purpose of collecting, gathering, generating, processing, storing and packaging information but for the dissemination or distribution of information as well. Information dissemination principles are therefore essentially part of the criteria used for evaluating information systems. Information dissemination is an important part of information systems management since the concept is part of the information life cycle that information systems are designed to complete. Without information dissemination the information life cycle is incomplete thus making it imperative that information systems be evaluated on that basis. For the purpose of this discussion, the Agricultural Market Information System (AMIS) shall be evaluated based on information dissemination principles. However, before making an attempt to evaluate the information system, it is important to comprehend what the concept of information dissemination entails and the principles thereof. Dissemination of information refers to “the distribution of information to the general public usually conducted by the government or an agency specifically given authorisation to release information for any public sector” (Fyler, 2011). The information released to the public is normally regulated by the government in terms of its content and quality of content. However, it is important that specific information is disseminated to the various groups of people that the information concerns...

Words: 3039 - Pages: 13

Premium Essay

Health Information System Analysis

...Information technology made the paradigm shift in record keeping of patients from a paper based system of health records to an electronic based system of health records. An electronic health record is a person’s official, digital health record and is shared among multiple health care providers and agencies. Since the commencement of the HITECH ACT in 2009 the implementations of electronic health record system have increased. The HITECH ACT introduced the electronic health record ‘meaningful use’ program and it is overseen by the Centers for Medicare and Medicaid Services and the Office of the National Coordinator for Health Information Technology. Hospitals and physicians who prove their use of government certified electronic health system meets the meaningful use criteria are eligible to receive (). Vendor neutral archives (VNA) and picture archiving and communications systems (PACS) are two major types of health information technology that help health care professionals store and manage patients’ medical images. These two health...

Words: 537 - Pages: 3

Premium Essay

Bsa310 Week2 Paper

...low-level data analysis, the kind most current stores use to keep inventory current. The program is set to provide a more detailed analysis of shopper’s spending habits at an individual level, which brings in a number of ethical, legal, and information security concerns. This paper is to discuss these concerns, what the company can do to protect such sensitive information, and what potential legal issues that may be faced implementing this system. Ethical Concerns This, above all else, should be the first consideration when implementing a system like this. For a system like this to work, customers will have many attributes of their lives revealed through deep analysis of their spending habits. Most people will be uncomfortable with such a notion, so the program cannot be mandatory. This must be left to the customer to choose to participate or not. If customers do opt in to the program, everything the company plans to do with their info should be laid out for them to know right up front. Especially when it comes to sharing sensitive information with other companies, customers may trust Kudler, more than likely they will not trust other companies that do business with Kudler. A good way to handle this might be to give the customer a choice if their info can be shared with “third-parties” or not. This way Kudler can still get a good benefit from the customer participating in the program, and gives the customer a better sense of well-being knowing the information gathered will all...

Words: 968 - Pages: 4

Premium Essay

Explain the Processes Involved in Storing Information in a Scientific Workplace.

...Task 1 Describe the procedure for storing scientific information in a laboratory management system. LIMS (laboratory information management system) is used in a laboratory for the management of samples, standards, instruments etc. The instruments are used in the laboratory network in order to be able to receive worklists from the LIMS so they are able to update any information that is relevant to other systems. An example of where LIMS is used is in industry as it maintains the information in the systems. Overall, LIMS have some special functions for example the registration of a sample, the storage of data and the equipment that is used in the analysis of the sample. The main feature of a LIMS is the sample management which involves tracking them. For instance if a sample container arrives the registration must be completed and the LIMS would track it and record its location. This could consist of printing off barcodes in order to identify the sample containers. LIMS could exchange and record electronic information. Along with all these functions of LIMS, it also manages the communication with your clients and the related documents. Also, all information is centralised. Some of the main types of information that would need to be stored on your lab’s LIMS would be COSHH records (control of substance hazardous to health) to ensure the awareness of health and safety, waste disposal to show how much waste is disposed and how much is actually produced, security because different...

Words: 363 - Pages: 2

Free Essay

Im Profolio

...computer or the Internet was hardly accessed, communication within distant people mainly relied on massive posts. You may not realize, information management was done in both cases as a personal was trying to organize information in a deliverable manner to others or his/herself. The term “information management” may be quite unfamiliar to general public. People would think that it might be related to computer science and information technology, which are newly brought out in this century. By the Dr. T.D. Wilson (University of Sheffield), information management refers to how information is acquired, organized, controlled and disseminated (Wilson). Indeed, information management has long been existed and “living” with us. Experts have different comments on Information management models. Some said models are typically wrong in nature but somehow useful (Box & Draper 1987). To summarise the features of IM model, it could be the representation of structure or diagnostic tool (HKU). This essay introduces four information management models and how they are involved in daily life. Each model would be illustrated with certain examples to let readers have a better understanding. In this essay, four information management models are discussed, namely Shannon Weaver Communication Model, 5 Rings Information Model, Kuhlthau’s Research Model and Information Transfer Cycle. A. Shannon Weaver Communication Model Shannon Weaver Communication Model is a cycle with several stages and...

Words: 2804 - Pages: 12

Premium Essay

Maneger

...CIS2000 Systems Analysis and Design Chapter One Tutorial Analysing the Business Case Review Questions * What is information technology, and why is it important to a business? Ans: Information technology (IT) is a combination of hardware and software products and services that companies use to manage, access, communicate, and share information. More than ever, business success depends on information technology. According to a Department of Commerce report, the IT industry has created a new economy, where advances in hardware, software, and connectivity provide unprecedented benefits to businesses and individuals around the world. * Identify the main components of information systems, and describe the system’s stakeholders? Ans: An information system has five key components: hardware, software, data, processes, and people. People who have an interest in an information system are called stakeholders. Stakeholder groups include the management group responsible for the system; the users, sometimes called end users, inside and outside the company who will interact with the system; and IT staff members, such as systems analysts, programmers, and network administrators who develop and support the system * Describes five types of information systems, and give an example of each. Ans: Information systems include enterprise computing systems, transaction processing systems, business support systems, knowledge management systems, and user productivity systems...

Words: 905 - Pages: 4

Premium Essay

Knowledge Management

...Hot Chile Surfwear has its head office in Cancun and retail offices are spread at 23 locations within Mexico at present. Knowledge Management System would require as a first step to invest in data acquisition mechanism. Currently the practice is that each store sends some data either in spreadsheets or hard papers to be collated at the head office. In order that this data becomes important information can be translated into knowledge, it is essential that some vital statistics and information be captured periodically. Depending upon the source of the information, we would be classifying this into two categories – internal and external. Internal Source: This would refer to all the information which exists within the stores and the head office and can be pulled out without any dependence on an external agency (Christopher, J. 1994). Some of the examples are -  Sales figures at each store  Customer foot fall at each store  Merchandise wise sales  Enquiries for product line unavailable  Customer Segmentation at each store – by age, gender, personality types  Salesperson wise sales or units sold  Productivity rate i.e. Number of people who bought something vs. total foot fall  Advertising Campaigns/ POS used at each store  Sales increase post advertising , in-store marketing External Source: In addition to the above, it would be essential that the company also gathers data from outside agencies, from secondary sources like research firms, market, Television,...

Words: 883 - Pages: 4

Premium Essay

New System Proposal

...requires an innovative information system proficient in the organization of product sales, which allows management of data by employees from computers and mobile devices. This new system would contain customer records and be password protected for sales agent’s individual accounts and further promote confidentiality of client and corporate data. Information security and carbon footprints will need to be addressed with creation of a new data warehouse. The cloud computing system would be an idyllic system for addressing the needs of Riordan Manufacturing and would be an inexpensive conversion from the old systems. Cloud computing initially evolved from visualization. The use of visualization would allow Riordan to separate its software, business applications, and data from hardware sources that may experience an issue. The cloud offers storage, network, and hardware virtualization. Businesses can set up private clouds as storage warehouses for company information. Information technology virtualization enhances the business’s assets and offers lower administration fees, reduced maintenance, and consolidation of company information for strategic marketing initiatives in one location. With this in place, there would be less risk of possible loss of important and pertinent information. The entire marketing division would be combined into one superior database for easier comparison of information. Switching to a cloud system would allow a speedier return on information requests from different...

Words: 1178 - Pages: 5