Professional Documents
Culture Documents
Shekhar - Khadka Assignment
Shekhar - Khadka Assignment
Shekhar - Khadka Assignment
The relationship between information system and balanced scorecard is that balanced scorecard issued,
because of the importance of information systems (IS) performance evaluation. Moreover, information
systems strategic management based on systems performance was considered in order to formulate the
information systems strategy based on the results of the systems performance. The information systems
strategic management was analyzed on the basis of balanced scorecard maturity model
Ans An information system architecture is a formal definition of the business processes and rules,
systems structure, technical framework, and product technologies for a business or organizational
information system.
An information system architecture usually consists of four layers:
• Business process architecture,
• Systems architecture,
• Technical architecture,
• Product delivery architecture.
The architecture of an information system encompasses the hardware and software used to deliver the
solution to the final consumer of services.Information system architecture is a blue print used to
develop, implement, maintain the elements in the organization.
Business architecture is a blue print of enterprise, that provides a common understanding of the
organization and is used to align objectives and demands.
A System architecture is the conceptual model that defines the structure, behavior and more views of
the systems. here we set the conventions, rules and standards employed in a system.
A Technical architecture defines all the Technical requirements like operational, performance, etc.
Product delivery architecture as the information regarding the delivery of the product, maintenance, etc.
Example for the system Architecture:
This is for the architecture for the banking services.
3. Define different physical and logical security that can be applied to information system. What
are the key thread and vulnerabilities against with information system must protected? What are
the different control measures that can be applied to protect information system against such
threats?
Ans The different physical and logical security that can be applied to information system are listed
below;
a. Locking the server room and providing with security guards and CCTV cameras with
burglar detection systems.
b. Educate the information system users about the different types of attach that can occur
and how they can happen.
e. Thoroughly scan the system for any data breach attempts by the use of White Hat
Hackers.
f. Check psychology of different users regularly and prevent unauthorized access by the
employees at any cost.
g. Common security measures and encryption mechanisms must be there to protect users
from prying ears.
By applying these solutions business organization can prevent themselves from great risk of
losing money and prestige.Information Systems because they store information and process them,
theyare vulnerableto different threats and misuse of information. Some of the common threats of the
contemporary information systems are shown below;
a. Physical Theft:
Information systems when not secured can be lost when they are not secure properly
b. Malware:
They are annoying, hostile and intrusive computer programs that hurts the information systems.
c. Computer Virus:
These are small pieces of software that can spread from one infected system to another corrupting and
stealing data in the computer even erasing everything in hard drive.
d. Trojan Horse:
Information System can get trojan horse software by simply downloading and installing software from
unknown sources. These appear legitimate but are rouge security software designed to lure people into
the designer’s scheme.
e.Spyware:
They are the software created by cybercriminals to spy on their victims. Spywares on the information
systems can cause severe information leaks like; trade secret leaking to the world that can cause serious
damage.
f. Spam:
Spam messages however may seem harmless and are clutter to the devices but they contain the links
which when clicked on could go to a website and install malicious software onto the system.
g. Phishing:
Phishing are fraudulent attempts by the hackers to obtain private information.In phishing user
deliberately puts the private information to the cybercriminals by which they can attack whoever are
psychologically vulnerable to give private information to illegitimate sources.
Following are some of the technologies and tools for protecting information resources.
a. Encryption:
Processing or transforming plain text into gibberish (cyphertext) that cannot be read by anyone other
than the sender and intended receiver.
c. Digital Certificates:
Establish protection of identity of users and electronic assets for protection of online transactions.
e. Firewalls:
Software to prevent users from accessing unauthorized private networks.
g. Digital Signatures:
Digital code attached to electronically transmitted messages to uniquely identify contents and sender.
4. What is critical success factors? Explain with example. What are the factors one needs to take
for successful change management in an organization?
Ans Critical success factors are the management term for an element that is necessary for an
organization or project to achieve its mission. It is a critical factor or activity required forensuring the
success of a company or an organization. The term was initially used in the world of data analysis and
business analysis. Critical success factors are those few things that must go well to ensure success for a
manager or organization and therefore they represent those managerial or enterprise areas that must be
given special and continuous attention to bring about high performance.
For example, Critical success factors for a smart phone company can be attributes, product features or
service details for decent design (else unattractive to buy) , had to recognize brand (if no one heard of
company or sales) had to have new innovative features. The factors one need to take for successful
change management in an organization are as follows:
i. plan:
Before undertaking any change, a business needs to have a clear and valid reason and mission for the
change process. Make sure any undertaking, no matter its size or impact, is realistic, measurable and
achievable there ins no use in creating a difficult situation if there is no significant gain to be made for
the organization.
ii. communication:
The most important factor in changing anything within a business, small or large, is to communicate
the change and its factors to the key stakeholders within the organization.
iii. Integrate:
If it's possible for the change in the program of your business to be adjusted, then open up your plans
for consultation with your stakeholder group. The staff of an organization are the people who work
with a particular product, or encounters customers or provide services whatever the case maybe for
your organization.
iv. motivate:
one of the biggest challenges with change management processes comes in the form of motivation.
Some changes are not necessarily beneficial in tough economic changes, occurrences like mergers and
downsizing can create an unmotivated environment in some
businesses.
v. Be confident:
staff are often guilty of reverting to old ways throughout a change process. A change process needs to
be organization wide, so have faith in the change being implemented and show your trust by limiting
opportunities for staff to revert to their old habits
Ans Web mining is the process of using data mining techniques and algorithms to extract information
directly from the Web by extracting it from Web documents and services, Web content, hyperlinks and
server logs. The goal of Web mining is to look for patterns in Web data by collecting and analyzing
information in order to gain insight into trends, the industry and users in general.
i) Web content mining — This is the process of mining useful information from the contents of Web
pages and Web documents, which are mostly text, images and audio/video files. Techniques used in this
discipline have been heavily drawn from natural language processing (NLP) and information retrieval.
ii) Web structure mining — This is the process of analyzing the nodes and connection structure of a
website through the use of graph theory. There are two things that can be obtained from this: the
structure of a website in terms of how it is connected to other sites and the document structure of the
website itself, as to how each page is connected.
iii) Web usage mining — This is the process of extracting patterns and information from server logs to
gain insight on user activity including where the users are from, how many clicked what item on the
site and the types of activities being done on the site.
6. Mention the types of cloud computing. Explain about data management in cloud.
IaaS is a cloud computing model where virtualized infrastructure is offered to, and managed for,
businesses by external cloud providers. With IaaS, companies can outsource for storages, servers, data
center space and cloud networking components connected through the internet, offering similar
functionality as that of an on-premises infrastructure. Some examples of the wide usage of IaaS are
automated, policy-driven operations such as backup, recovery, monitoring, clustering, internal
networking, website hosting, etc. The service provider is responsible for building the servers and
storage, networking firewalls/ security, and the physical data center. Some key players offering IaaS are
Amazon EC2, Microsoft Azure, Google Cloud Platform, GoGrid, Rackspace, Digital Ocean among
others.
PaaS builds on IaaS. Here, cloud vendors deliver computing resources, both cloud software and
hardware infrastructure components like middleware and operating systems, required to develop and
test applications. The PaaS environment enables cloud users (accessing them via a webpage) to install
and host data sets, development tools and business analytics applications, apart from building and
maintaining necessary hardware. Some key players offering PaaS are Bluemix, CloudBees,
Salesforce.com, Google App Engine, Heroku, AWS, Microsoft Azure, OpenShift, Oracle Cloud, SAP
and OpenShift.
Cloud data management is the practice of storing a company’s data on an offsite server that is typically
owned and overseen by a vendor who specializes in cloud data hosting. Managing data in the cloud
provides an automated backup strategy, professional support, and ease of access from any location. The
benefits of a cloud data management system are consistent with the overall benefits the cloud has to
offer, and they are considerable.
i. Security
ii. Scalability and saving
iii. Governed access
iv. Automated backups and disaster recovery
v. Improved data quality
vi. Automated updates
vii. Sustainability
7. Differentiate between text mining and web usage mining.
Text Mining
Text mining is different from what we’re familiar with in web search. In search, the user is
typically looking for something that is already known and has been written by someone else.
The problem is pushing aside all the material that currently isn’t relevant to your needs in order
to find the relevant information.
In text mining, the goal is to discover heretofore unknown information, something that no one
yet knows and so could not have yet written down.
The difference between regular data mining and text mining is that in text mining the patterns
are extracted from natural language text rather than from structured databases of facts.
Databases are designed for programs to process automatically; text is written for people to read.
We do not have programs that can “read” text and will not have such for the foreseeable future.
Many researchers think it will require a full simulation of how the mind works before we can
write programs that read the way people do.
Web usage mining is the process of finding out what users are looking for on internet. Some
users might be looking at only textual data whereas some other might want to get multimedia
data. Web usage mining also helps finding the search pattern for a particular group of people
belonging to a particular region.
Using web usage mining, it can extract useful information from the clickstream analysis of web
server log containing details of webpage visits, transactions. Web server log analyzer may
include software such as Net Tracker, Awaits to view how often is the website visited, which
kind of product is the best and worst sellers in a e-commerce website. The ability to track web
users’ browsing behavior down to individual mouse clicks makes it possible to personalize
services for individual customers on a massive scale. This ‘mass customization’ of services not
only helps customers by satisfying their needs, but also results in customer loyalty. Due to a
more personalized and customer-centered approach, the content and structure of a web site canbe
evaluated and adapted to the customer’s preferences and the right offers can be made to the
right customer.
8. Write short notes on Next generation balanced scorecard.
Ans Next generation balanced scorecard is the concept or implementation of the things that are lacking
in the previous balanced scorecard which must be implemented for successful strategic achievement by
an organization. It includes critical alignment, shared responsibility and cause and effect relationships
which are not included in the traditional balanced scorecard. It implements the concept that the
balanced scorecard should be broken down to the underlying levels by taking few of the operational
goals and key figures from each individual strategic goals from top to down. It then assigns each of the
measured variables that can be influenced, to the responsible employees in the sense of the
performance agreement. It also manages a comprehensive target and key figures library to keep track of
the different sectors for strategic controlling.
Ans A recommendation system is a computer program that helps a user discover products
and content by predicting the user’s rating of each item and showing them the items that they
would rate highly. Recommendation systems are everywhere. Recommendation systems play
an important role in helping users find products and content they care about. Behind the
scenes, these systems are powered by a recommender function. It can be further defined as a
system that produces individualized recommendations as output or has the effect of guiding
the user in a personalized way to interesting objects in a larger space of possible
options. There are different types of recommender systems which work primarily in the
Media and Entertainment industry: Collaborative Recommender system, Content-based
recommender system and Hybrid recommender system.
Ans In traditional Information system each functional unit like production, sales,
resources, etc in each level of management maintains its own means of data storage which is
not properly synchronized which creates problems in integration and interaction between
different units. Whereas in case of Enterprise system, there is an integrated suite of business
applications for virtually every department, process and industry. In case of Enterprise
System, all the data related to every functional units in an organization is maintained/stored at
a single data warehouse which allows proper integration and solves various problems in
traditional information systems. And Traditional Information system can exist in a modular
form whereas Enterprise system cannot.
OTLAP
It stands for online transaction processing system. It is an online transactional system and manages
database modification. The main focus of OLTP system is to record the current update, insertion and
deletion while transaction. OLTP and its transactions are the original source of data. OLTP has short
transactions. The processing time of a transaction is comparatively less in OLTP. The tables in OLTP
database must be normalized (3NF). Its queries are simpler. The best example for OLTP system is an
ATM, in which using short transactions we modify the status of our account.
OLAP
It stands for Online Analytical Processing System. It is an online data retrieving and data analysis
database modification. System. It allows a user to execute complex queries to extract multidimensional
data. Different OLTPs database becomes the source of data for OLAP. OLAP has long transactions. The
processing time of a transaction is comparatively more in OLAP. The tables in OLAP database may not
be normalized. Its queries are more complex. The example for OLAP is to view a financial report, or
budgeting, marketing management, sales report, etc.
We can divide IT systems into transactional (OLTP) and analytical (OLAP). In general, we
can assume that OLTP systems provide source data to data warehouses, whereas OLAP
systems help to analyze it.
OLTP (On-line Transaction Processing) is characterized by a large number of
short on-line transactions (INSERT, UPDATE, DELETE). The main emphasis for OLTP
systems is put on very fast query processing, maintaining data integrity in multi-access
46environments and an effectiveness measured by number of transactions per second. In OLTP
database there is detailed and current data, and schema used to store transactional databases is
the entity model(usually3NF).
OLAP (On-line Analytical Processing) is characterized by relatively low volume of
transactions. Queries are often very complex and involve aggregations. For OLAP systems a
response time is an effectiveness measure. OLAP applications are widely used by Data
Mining techniques. In OLAP database there is aggregated, historical data, stored in multi-
dimensional schemas (usually star schema).
Example of OLAP:Any Datawarehouse system is an OLAP system. Uses of OLAP
are as follows
A company might compare their mobile phone sales in September with sales in
October, then compare those results with another location which may be stored in a
sperate database
Example of OLTP system: An example of OLTP system is ATM center. Assume that a
couple has a joint account with a bank. One day both simultaneously reach different ATM
centers at precisely the same time and want to withdraw total amount present in their bank
account.