Free Essay

Implications of Big Data for the Design, Implementation and Use of Enterprise-Level Information Systems in Defense

In:

Submitted By Burton77
Words 647
Pages 3
Implications of Big Data for the design, implementation and use of enterprise-level information systems in Defense
While technology rapidly advances and information becomes a strategic asset, Big Data arouses the demand of politicians and military leaders to make use of possible information advantages to allegedly better support the military mission (DOD, 2010). However, the defense sector is still struggling with the implementation of adequate enterprise-level information systems. Therefore, militaries have to assess the necessity of using Big Data within the different business processes, and they have to ensure that the current implementation of enterprise-level information systems remains adaptable and scalable for future business needs.
The amount of data is continuously on the rise due to the rapid growth of mobile devices and applications, smart sensors and devices, cloud computing solutions, and […] portals (“Impact,” 2013). Also, the capability to analyze and to correlate structured with unstructured data will enhance. But militaries must avoid getting distracted from implementing a good information management system that serves current business needs, rather than trying to rapidly dominate Big Data. Instead, the success of todays mission has to gain center stage. Thus, one has to focus on three principles. First: One has to act now but also has to keep in mind that there has to be a transition from information management to Big Date in the future, as Big Data will affect more and more business processes. This means one has to think big, but has to start small. Second, one has to consider the special needs for security and privacy of the defense environment. As a consequence, militaries have to train and educate the enterprise to handle big amounts of data securely. Finally, one to has to analyze, whether the business needs justify a shift towards Big Data in specific business processes. Keeping these principles in mind, the following tasks derive from Big Data for the design, implementation and use of enterprise-level information systems in Defense. During the design phase, the integration into existing or already implemented systems is the main driver. Big Data requires flexible and scalable systems and high performance hardware. Information systems have to be reviewed, whether they still can provide the necessary output. Relational databases may be not efficient enough to handle the requirements to analyze Big Data and have to be replaced. In the design phase, it is crucial to determine, whether to use ready-made or customized solutions. One has to decide, how the data shall be deployed, and which service model delivers the best service at acceptable costs. During implementation, one has to continuously assess existing policies, information systems, and business needs. The alignment of business processes and changed security and privacy requirements may require policy changes and adaption of operational guidelines. While running an enterprise-level information system, a continuous assessment between business’ needs and available data ensures the economically appropriate development of Big Data capabilities for other business processes. The information system then grows together with the requirements of the mission and not with the amount of data.
Militaries are at a tipping point, realizing that information is a strategic asset that can leverage the mission’s success. However, as they are still struggling with the implementation of current enterprise-level information system it needs a scalable and circumspect approach to prevent failure. It is important to explore the options, and militaries must implement new systems where necessary, but they always have to focus on the integration in accordance with the business needs.
References

Impact (2013), The Impact of Big Data on Government, Retrieved from http://www.ironmountain.com/Knowledge-Center/Reference-Library/View-by-Document-Type/White-Papers-Briefs/Sponsored/IDC/The-Impact-of-Big-Data-on-Government.aspx#sthash.30FdUjSF.dpuf
Department of Defense (2012), Department of Defense Information Enterprise Strategic Plan 2010-2012, Retrieved from http://dodcio.defense.gov/Portals/0/Documents/DodIESP-r16.pdf

Similar Documents

Premium Essay

Cloud Computing Security

...Cloud Computing Security Mohamed Y. Shanab, Yasser Ragab, Hamza nadim Computing & Information Technology AAST Cairo, Egypt {myshanab, yasseritc, hamzanadim }@gmail.com Abstract-- In the past two decades, data has been growing in a huge scale making it almost impossible to store, maintain and keep all data on premises , thus emerged the idea of cloud computing and now it’s becoming one of the most used services used by firms, organizations and even governments. But its security risks are always a concern and a major setback. In this paper we talk about those risks and the most feared ones and what are the latest techniques to overcome them, we also discuss a solution on cloud computing based on a fully homomorphic encryption Key Words -- Cloud computing , Cloud computing security, Challenges, Privacy, Reliability, Fully homomorphic encryption. interaction. This cloud model promotes availability and is composed of five essential characteristics, three service models, and four deployment models." [1] II. TOP BENEFITS OF CLOUD COMPUTING  Achieve economies of scale. increase volume output or productivity with fewer people. Your cost per unit, project or product plummets. Reduce spending on technology infrastructure. Maintain easy access to your information with minimal upfront spending. Pay as you go (weekly, quarterly or yearly), based on demand. Globalize your workforce on the cheap.People worldwide can access the cloud, provided they have an Internet connection....

Words: 4691 - Pages: 19

Premium Essay

Enterprise Resource

...com/0263-5577.htm IMDS 106,9 Enterprise resource planning success An exploratory study of the financial executive perspective Alan R. Peslak Penn State University, Dunmore, Pennsylvania, USA Abstract Purpose – To explore the views of top corporate financial executives on the success of implementation of enterprise resource planning (ERP) systems as well as the variables associated with ERP project success. Specifically, relationships between dependent variables cost and budget performance on the independent variable overall project success are studied. Variables influencing cost and time performance are also explored. Design/methodology/approach – An analysis of secondary data obtained from the 2003 financial executives international comprehensive survey-based research on technology issues for financial executives. Multiple regression analysis and other statistical methods are used. Findings – The findings indicate that ERP implementations are generally viewed as moderately successful by top financial executives. In addition, both cost and time were significantly correlated with an overall view of success with cost performance holding higher influence. Several variables were found to significantly correlate with cost and time performance. Research limitations/implications – The study can be used as a basis for further exploration on the influences on ERP success as well as serve as a preliminary model to analyze any IT project success. Practical implications – The findings can be used to guide...

Words: 6621 - Pages: 27

Free Essay

Applied Soa

...Applied SOA Service-Oriented Architecture and Design Strategies Mike Rosen Boris Lublinsky Kevin T. Smith Marc J. Balcer Wiley Publishing, Inc. Applied SOA Applied SOA Service-Oriented Architecture and Design Strategies Mike Rosen Boris Lublinsky Kevin T. Smith Marc J. Balcer Wiley Publishing, Inc. Applied SOA: Service-Oriented Architecture and Design Strategies Published by Wiley Publishing, Inc. 10475 Crosspoint Boulevard Indianapolis, IN 46256 www.wiley.com Copyright  2008 by Wiley Publishing, Inc., Indianapolis, Indiana Published simultaneously in Canada ISBN: 978-0-470-22365-9 Manufactured in the United States of America 10 9 8 7 6 5 4 3 2 1 No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 646-8600. Requests to the Publisher for permission should be addressed to the Legal Department, Wiley Publishing, Inc., 10475 Crosspoint Blvd., Indianapolis, IN 46256, (317) 572-3447, fax (317) 572-4355, or online at http://www.wiley.com/go/permissions. Limit of Liability/Disclaimer of Warranty: The publisher and...

Words: 218699 - Pages: 875

Premium Essay

Jacket-X Paper

...other safety-related clothing applications. The Chief Information Officer (CIO) at Jacket-X is concerned with the current Information Technology (IT) security implementations and procedures. He has valid concerns due to reports from Human Resources (HR) stating financial issues with last year’s payrolls. There are also concerns with external network vulnerabilities that possibly can give hackers unauthorized access to company data and information. The CIO has internal IT security concerns due to a recent incident with an executive employee infecting the company’s network with malicious software from a company issued laptop. To help stay current with technology and compliant with federal laws Jacket-X decided to install a new Identity Management (IdM) system with Single Sign On (SSO) features. Several employees and customers do not like the new IdM system due to having privacy and data access concerns. This paper will analyze and discuss potential threats and vulnerabilities within the Jacket-X Corporation enterprise network. The paper will identify various IT security measures that will address the known threats and vulnerabilities. There will be discussions and recommendations made for choosing the best IdM system for Jacket-X. These discussions will also consist of the company addressing SSO privacy concerns, SOX compliance, inadequacies of current company IT security, and possible implementation issues with the new IdM system. Vulnerability Assessment for Jacket-X Corporation ...

Words: 6831 - Pages: 28

Free Essay

Security Weaknesses Top 25

...easy to exploit. They are dangerous because they will frequently allow attackers to completely take over the software, steal data, or prevent the software from working at all. The Top 25 list is a tool for education and awareness to help programmers to prevent the kinds of vulnerabilities that plague the software industry, by identifying and avoiding all-too-common mistakes that occur before software is even shipped. Software customers can use the same list to help them to ask for more secure software. Researchers in software security can use the Top 25 to focus on a narrow but important subset of all known security weaknesses. Finally, software managers and CIOs can use the Top 25 list as a measuring stick of progress in their efforts to secure their software. The list is the result of collaboration between the SANS Institute, MITRE, and many top software security experts in the US and Europe. It leverages experiences in the development of the SANS Top 20 attack vectors (http://www.sans.org/top20/) and MITRE's Common Weakness Enumeration (CWE) (http://cwe.mitre.org/). MITRE maintains the CWE web site, with the support of the US Department of Homeland Security's National Cyber Security Division, presenting detailed descriptions of the top 25 programming errors along with authoritative guidance for mitigating and avoiding them. The CWE site contains data on...

Words: 24162 - Pages: 97

Free Essay

Sehandbook

...SYSTEMS ENGINEERING HANDBOOK A GUIDE FOR SYSTEM LIFE CYCLE PROCESSES AND ACTIVITIES INCOSE-TP-2003-002-03 June 2006 INCOSE Systems Engineering Handbook v. 3 SYSTEMS ENGINEERING HANDBOOK A GUIDE FOR SYSTEM LIFE CYCLE PROCESSES AND ACTIVITIES INCOSE-TP-2003-002-03 INCOSE SYSTEMS ENGINEERING HANDBOOK, version 3 June 2006 Edited by: Cecilia Haskins Copyright © 2006 International Council on Systems Engineering, subject to restrictions listed on the inside cover. INCOSE-TP-2003-002-03 June 2006 INCOSE Systems Engineering Handbook v. 3 This INCOSE Technical Product was prepared by the Systems Engineering Handbook Development Team of the International Council on Systems Engineering (INCOSE). It is approved by INCOSE for release as an INCOSE Technical Product. Copyright © 2006 by INCOSE, subject to the following restrictions: Author use: Authors have full rights to use their contributions in a totally unfettered way with credit to this INCOSE Technical Product. Abstraction is permitted with credit to the source. INCOSE use: Permission to reproduce this document and use this document or parts thereof by members of INCOSE and to prepare derivative works from this document for INCOSE use is granted, with attribution to INCOSE and the original author(s) where practical, provided this copyright notice is included with all reproductions and derivative works. Content from ISO/IEC 15288:2002(E) are used by permission, and are not to be reproduced other than...

Words: 63595 - Pages: 255

Premium Essay

Nestle Erp

...2010 INFORMATION MANAGEMENT PBSA 823 Chicken Run Group Assignment Lecturer: Mr. J. C. Coetzee 9/18/2010 Nestlé struggles with Enterprise Systems CRITERIA FOR MARKING MBA-ASSIGNMENTS 1 | Meeting the objectives of the assignmentThe extent to which: | 60 | | *1.1 | the assignment was understood and answered comprehensively | 10 | | *1.2 | independent (own) thought is reflected | 10 | | 1.3 | insight in the topic was demonstrated | 10 | | 1.4 | logical, systematic thought and reasoning is demonstrated | 10 | | 1.5 | quality research (literature study and / or empirical work) was done | 10 | | 1.6 | conclusions are logic, meaningful and substantiated | 10 | | 2 | Presentation and technical aspectsThe extent to which: | 30 | | 2.1 | the content shows a logical andintegrateddevelopment and forms a balancedholisticwhole | 15 | | 2.2 | the executivesummary reflects the content comprehensively and meaningfully | 5 | | 2.3 | the table of contents, references and list of sources are noted correctly | 5 | | 2.4 | the style and language (grammar) meet the requirements | 5 | | 3 | General quality rating | 10 | | | Evaluator’s general evaluation mark of the assignment’s quality - taking into consideration the above and other factors | | | | TOTAL | 100 | | Assignment Word Count: Chicken Run Group Members “There is nothing more determined than poultry with a plan…” Bezuidenhout, P.J. 1224 6093 Botha...

Words: 4468 - Pages: 18

Free Essay

Big Data

...McKinsey Global Institute June 2011 Big data: The next frontier for innovation, competition, and productivity The McKinsey Global Institute The McKinsey Global Institute (MGI), established in 1990, is McKinsey & Company’s business and economics research arm. MGI’s mission is to help leaders in the commercial, public, and social sectors develop a deeper understanding of the evolution of the global economy and to provide a fact base that contributes to decision making on critical management and policy issues. MGI research combines two disciplines: economics and management. Economists often have limited access to the practical problems facing senior managers, while senior managers often lack the time and incentive to look beyond their own industry to the larger issues of the global economy. By integrating these perspectives, MGI is able to gain insights into the microeconomic underpinnings of the long-term macroeconomic trends affecting business strategy and policy making. For nearly two decades, MGI has utilized this “micro-to-macro” approach in research covering more than 20 countries and 30 industry sectors. MGI’s current research agenda focuses on three broad areas: productivity, competitiveness, and growth; the evolution of global financial markets; and the economic impact of technology. Recent research has examined a program of reform to bolster growth and renewal in Europe and the United States through accelerated productivity growth; Africa’s economic potential;...

Words: 60035 - Pages: 241

Free Essay

Mcda Analysis

...McKinsey Global Institute June 2011 Big data: The next frontier for innovation, competition, and productivity The McKinsey Global Institute The McKinsey Global Institute (MGI), established in 1990, is McKinsey & Company’s business and economics research arm. MGI’s mission is to help leaders in the commercial, public, and social sectors develop a deeper understanding of the evolution of the global economy and to provide a fact base that contributes to decision making on critical management and policy issues. MGI research combines two disciplines: economics and management. Economists often have limited access to the practical problems facing senior managers, while senior managers often lack the time and incentive to look beyond their own industry to the larger issues of the global economy. By integrating these perspectives, MGI is able to gain insights into the microeconomic underpinnings of the long-term macroeconomic trends affecting business strategy and policy making. For nearly two decades, MGI has utilized this “micro-to-macro” approach in research covering more than 20 countries and 30 industry sectors. MGI’s current research agenda focuses on three broad areas: productivity, competitiveness, and growth; the evolution of global financial markets; and the economic impact of technology. Recent research has examined a program of reform to bolster growth and renewal in Europe and the United States through accelerated productivity growth; Africa’s economic potential;...

Words: 60035 - Pages: 241

Premium Essay

Business Intelligence

...AND ANALYTICS: FROM BIG DATA TO BIG IMPACT Hsinchun Chen Eller College of Management, University of Arizona, Tucson, AZ 85721 U.S.A. {hchen@eller.arizona.edu} Roger H. L. Chiang Carl H. Lindner College of Business, University of Cincinnati, Cincinnati, OH 45221-0211 U.S.A. {chianghl@ucmail.uc.edu} Veda C. Storey J. Mack Robinson College of Business, Georgia State University, Atlanta, GA 30302-4015 U.S.A. {vstorey@gsu.edu} Business intelligence and analytics (BI&A) has emerged as an important area of study for both practitioners and researchers, reflecting the magnitude and impact of data-related problems to be solved in contemporary business organizations. This introduction to the MIS Quarterly Special Issue on Business Intelligence Research first provides a framework that identifies the evolution, applications, and emerging research areas of BI&A. BI&A 1.0, BI&A 2.0, and BI&A 3.0 are defined and described in terms of their key characteristics and capabilities. Current research in BI&A is analyzed and challenges and opportunities associated with BI&A research and education are identified. We also report a bibliometric study of critical BI&A publications, researchers, and research topics based on more than a decade of related academic and industry publications. Finally, the six articles that comprise this special issue are introduced and characterized in terms of the proposed BI&A research framework. Keywords: Business intelligence and analytics, big data analytics, Web 2.0 ...

Words: 16335 - Pages: 66

Premium Essay

Bpcl

...ANALYTICS: FROM BIG DATA TO BIG IMPACT Hsinchun Chen Eller College of Management, University of Arizona, Tucson, AZ 85721 U.S.A. {hchen@eller.arizona.edu} Roger H. L. Chiang Carl H. Lindner College of Business, University of Cincinnati, Cincinnati, OH 45221-0211 U.S.A. {chianghl@ucmail.uc.edu} Veda C. Storey J. Mack Robinson College of Business, Georgia State University, Atlanta, GA 30302-4015 U.S.A. {vstorey@gsu.edu} Business intelligence and analytics (BI&A) has emerged as an important area of study for both practitioners and researchers, reflecting the magnitude and impact of data-related problems to be solved in contemporary business organizations. This introduction to the MIS Quarterly Special Issue on Business Intelligence Research first provides a framework that identifies the evolution, applications, and emerging research areas of BI&A. BI&A 1.0, BI&A 2.0, and BI&A 3.0 are defined and described in terms of their key characteristics and capabilities. Current research in BI&A is analyzed and challenges and opportunities associated with BI&A research and education are identified. We also report a bibliometric study of critical BI&A publications, researchers, and research topics based on more than a decade of related academic and industry publications. Finally, the six articles that comprise this special issue are introduced and characterized in terms of the proposed BI&A research framework. Keywords: Business intelligence and analytics, big data analytics...

Words: 16335 - Pages: 66

Premium Essay

Lean Manufacturing

...Response (5302W) Policy, Economics & Innovation (1807T) EPA100-R-03-005 October 2003 www.epa.gov/ innovation/lean.htm Lean Manufacturing and the Environment: Research on Advanced Manufacturing Systems and the Environment and Recommendations for Leveraging Better Environmental Performance ACKNOWLEDGMENTS This report was prepared for the U.S. Environmental Protection Agency's Office of Solid Waste and Emergency Response (OSWER) and Office of Policy, Economics, and Innovation (OPEI). Ross & Associates Environmental Consulting, Ltd. prepared this report for U.S. EPA under contract to Industrial Economics, Inc. (U.S. EPA Contract # 68-D9-9018). DISCLAIMER The observations articulated in this report and its appendices represent Ross & Associates’ interpretation of the research, case study information, and interviews with lean experts and do not necessarily represent the opinions of the organizations or lean experts interviewed or researched as part of this effort. U.S. Environmental Protection Agency (EPA) representatives have reviewed and approved this report, but this does not necessarily constitute EPA endorsement of the observations or recommendations presented in this report. Lean Manufacturing and the Environment: Research on Advanced Manufacturing Systems and the Environment and Recommendations for Leveraging Better Environmental Performance Table of Contents Executive Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ....

Words: 33834 - Pages: 136

Premium Essay

Chapter 2 It Infrastructure and Support Systems

...Chapter 2 IT Infrastructure and Support Systems IT at Work IT at Work 2.1 Western Petro Controls Costs with its Trade Management System For Further Exploration: Which processes are being automated and why? PetroMan is a comprehensive trading system that triggers buying and selling activities and integrates contract management, risk management, accounting, and pipeline scheduler. Using the PetroMan, the company can place bids and automatically capture a contract for refined products; and schedule and confirm deliveries in pipelines. PetroMan also handles the resale of fuels, including electronic invoicing and a credit module that checks and tracks a customer’s credit risk. This tracking is done by hedging large purchasing contracts by selling futures on the New York Mercantile (Commodities) Exchange. By hedging, the company protects itself against the risk of a large drop in oil prices. The software is plugged directly into the primary commodity exchanges--automating the process. Why is controlling risk important? By hedging, the company protects itself against the risk of a large drop in oil prices. The software is plugged directly into the primary commodity exchanges--automating the process. Does PetroMan provide Western Petro with a competitive advantage? Explain. Competitive advantage is defined as the strategic advantage one business entity has over its rival entities within its competitive industry. Achieving Competitive Advantage strengthens and positions...

Words: 10310 - Pages: 42

Premium Essay

Application.Servers.for.E-Business

...Chapter 2 - A Survey of Web Technologies - 22 Chapter 3 - Java - 44 Chapter 4 - CORBA - 65 Chapter 5 - Application Servers - 82 Chapter 6 - Design Issues for Enterprise Deployment of Application Servers - 114 Chapter 7 - Tying It All Together - 137 References - 160 For More Information - 163 page 1 Application Servers for E-Business Application Servers for E-Business Lisa M. Lindgren Auerbach Library of Congress Cataloging-in-Publication Data Lindgren, Lisa. Application servers for e-business / Lisa M. Lindgren. p.cm. Includes bibliographical references and index. ISBN 0-8493-0827-5 (alk. paper) 1. Electronic commerce. 2. Application software—Development. I. Title. HF5548.32 .L557 2001 658′.0553–dc21 00-050245 This book contains information obtained from authentic and highly regarded sources. Reprinted material is quoted with permission, and sources are indicated. A wide variety of references are listed. Reasonable efforts have been made to publish reliable data and information, but the author and the publisher cannot assume responsibility for the validity of all materials or for the consequences of their use. Neither this book nor any part may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, microfilming, and recording, or by any information storage or retrieval system, without prior permission in writing from the publisher. The consent of CRC Press LLC does not extend to copying for general distribution,...

Words: 98260 - Pages: 394

Premium Essay

Erp Integration Scm, Crm

...Integrating ERP, CRM, Supply Chain Management, and Smart Materials Dimitris N. Chorafas AUERBACH Library of Congress Cataloging-in-Publication Data Chorafas, Dimitris N. Integrating ERP, CRM, supply chain management, and smart materials / Dimitris N. Chorafas. p. cm. Includes bibliographical references and index. ISBN 0-8493-1076-8 (alk. paper) 1. Business logistics. 2. Customer relations. I. Title. HD38.5 .C44 2001 658.5—dc21 2001022227 This book contains information obtained from authentic and highly regarded sources. Reprinted material is quoted with permission, and sources are indicated. A wide variety of references are listed. Reasonable efforts have been made to publish reliable data and information, but the author and the publisher cannot assume responsibility for the validity of all materials or for the consequences of their use. Neither this book nor any part may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, microfilming, and recording, or by any information storage or retrieval system, without prior permission in writing from the publisher. The consent of CRC Press LLC does not extend to copying for general distribution, for promotion, for creating new works, or for resale. Specific permission must be obtained in writing from CRC Press LLC for such copying. Direct all inquiries to CRC Press LLC, 2000 N.W. Corporate Blvd., Boca Raton, Florida 33431. Trademark Notice: Product or corporate names may be trademarks...

Words: 145509 - Pages: 583