Your task is to write a reflective essay based on the following topics discussed in the class:
- Database, Big Data and Business Intelligence
- How Information systems support decision making in organisation. The protection and safeguarding of databases in an organisation.
A typical process in developing your essay might comprise:
1. Sourcing and reviewing relevant literature on the above subjects.
2. Finding a relevant, published case study and analysing it critically.
3. Synthesising the outcomes of the two activities above to provide findings and recommendation
To achieve the learning outcomes, you need to identify and effectively describe one or more case studies where the technology/practice under investigation is used.
The essay depicts the importance of using database management system in a business organization. Depending on the type of the business, large set off data are required to be handled by the manager or higher authority of a business organization. In order to manage those data appropriately the management authority of large enterprises use information system. A critical research on big data, database and business intelligence is conducted in this essay.
Different criteria such as system specification, design, implementation and their appropriate maintenance are required to be considered by the developer team. Based on the business requirements data should be gathered from various resources that influences the managerial decision making approach. In order to manage the system satisfactorily the database administrator of the business organization is required to play appropriate roles and responsibilities (Busby et al. 2014). In addition to this, the requirements of data protection and information safeguard are also elaborated in this essay.
Database management system: Database management system is referred to as a large set of processed and well organized data that are used by different business organization. The data set could be used by multiple users at a time. It helps to establish an appropriate relationship between the data and their users. In a database management system data are stored and those data could even be accessed by the authenticated users whenever required. The drawbacks of traditional data processing are resolved after implementation of the database management system the concept (Chen and Zhang 2014). The definition of database includes data acquisition and data access from the storage according to the organizational requirements. The concept of database helps to develop a consistence system that avoids the data redundancy. In traditional approach a single data might get stored in the storage for multiple times which were very much confusing for the users. Basically in order to avoid these errors database systems are used and shared by the users. If any information is found to be no more necessary then, that could be deleted from the data server (Busby et al. 2014). Again if the users want to change any data to the table then, the data table could be updated by using the update anomaly. In addition to this, if any user wants to add new information then insertion anomaly is used. Database management has positive as well as negative impact on the business organizations.
Big data: Nowadays, applications of different big data analytical tools are increasing rapidly in large business organizations. However, during analysis period it has been found that all those business organizations that use big data tool are facing major challenges. Due to lack of strong data management and governance mechanism most of the large organizations are currently facing high security challenges from the competitive business market. Many opportunities and challenges are associated to the big data approach.
Big data
Challenges of big data: One of the most important big data tools named as Hadoop is very hard and with the big data technology it is very much needed to scale up a scale down the system based on the user demand (Inukollu, Arsi and Ravuri 2014). Even the growth of a big data project is very difficult to monitor and this is the reason for which most of the large organization fails to control and monitor the progress of the big data projects. From the analysis it has been found that the technology is very costly and due to lack of data protection the data might get hacked b the external attackers.
Opportunities of big data: Big data analytics is found as an important tool that enables the business organizations to analyze all the information that are operated by their consumers and their employees frequently (Terzi, Terzi and Sagiroglu 2015). Big data could unlock different significant values by making the information completely transparent. Even with the help of big data tools in the digital form more number of transactional data could be created and stored as well. Big data can develop the next generation of products and services.
Advantages of Business intelligence: The business intelligence computing software helps a business organization to identify the effective consumers by determining the business issues. After the adaptation of this software the top management team becomes capable to look all the details of the products and items. The financial data, business data and even consumers details can be easily handled by the management team after adapting this software (Li et al. 2014). In order to avoid data loss and for eliminating unnecessary data from the server most of the organizations use the business intelligence software. For the sales force management BI is useful. Depending on the current business environment BI helps the business organizations to identify its capabilities and relative strength also. It also helps to take fact based and beneficial business decisions.
Disadvantages of Business intelligence: Though large set of advantages are associated to BI still some disadvantages are also associated to it. In terms of monetary expenses and human resources BI application is too costly for small business organization (Cardenas, Manadhata and Rajan 2013). Though BI tools work very efficiently but still due to lack of expert teams those cannot be handled properly. Thus for implementing this technology organization needs well trained and expert team. Incorrect BI application also might exploit confidential data in open resources. If proper security tools are not adapted by the organizations then, the data will be in danger.
Challenges and opportunities of big data
Solution of the issues associated to database management system: In order to manage large set of data currently most of the business organizations use database server to store and access data. There are many ways to protect workplace confidential data from the external attackers (Rittinghouse and Ransome 2016). For maintaining the workplace confidentiality appropriate encryption keys are required to be adapted by the business organizations so that none of the unauthenticated users could access the data server or misuse the data. For preventing data hacking it is also found that a single organization is using multiple databases for storing data. Depending on the category of data, the information is stored in different data servers. It helps the users to access data from the server easily in a lesser amount of time.
Analysis on the way through which information system supports the decision making approach in an organization: In order to make valid decision with up to date information and business operations most of the large to medium business organizations use Information system (Demchenko et al. 2013). Proper management of the information system helps to take effective and beneficial organizational decision. The organizational culture gets affected during the transition of industrial society in the information and knowledge society. In the contemporary society Information system plays crucial roles. The organization culture changes dramatically after the adaptation of information system. Without the help of computer based information, none of the enterprises could sustain in the global environment (Bajaj and Sion 2014). The IS helps the managers to reduce and identify the business uncertainty. The business managers could take effective and supportive decision for the organizations after the adaptation of the IS.
The improvement of IS has accelerated drastic change in all business operations. In previous days for supporting the business operations and functions IS were used by the management team but currently for making effective and efficient business decisions large organizations are installing Information System (Hashem et al. 2015). The advanced technologies help the users to access data from the storage more quickly and efficiently. Regardless of the size of the business organizations, IS plays important and effective roles. Information System is referred to as a tool that helps to take effective decisions for the business organization. At the lower level of business operations IS plays paramount roles. The IS currently used by the organizations are more complex than the traditional systems (Jagadish et al. 2014). In all hierarchical level of management system the IS are used widely rather it can be said that, each of the level are supported by the IS for decision making.
Business intelligence
Decision making is an integrated part of business organizations that might have positive and negative impact on the revenue structure.
Different Phases of decision making are as follows:
- Intelligences
- Design
- Choice
- Implementation
Technical responsibilities of a Database Administrator (DBA): Starting from the database configuration up to its maintenance, the database administrators are bound to play various important roles and responsibilities. Different database software is used by different business organizations to manage the large set of data with appropriate security (Chen and Zhan 2014). The official roles and responsibilities are as follows:
Decision on hardware device adaptation: During the project initiation phase, depending on the estimated budget the DBAs should select the exact hardware devices.
Managing data integrity: The data integrity is required to be managed properly so that unauthorized users cannot hack the information from the data server by maintaining the data consistency.
Capacity issues: The size of the database should be decided by the DBA so that it could avoid data oriented issues.
Tuning performance of the database: If the users fail to access data from the server on required time with appropriate speed then, it will cause major loss to the organization (Hu, Dou and Liu 2014). The performance could be improved if modified SQL commands are used.
Performance monitoring: The daily performances of the business organization are required to be controlled and monitored entirely by the database administrator.
Database accessibility: The data server access power should be decided by the DBA only. Only the authorized list of users will be able to access data from the server. It will help to maintain the data security.
The protection and safeguard of database in an organization: In order to keep the confidential data secured from the external attackers different security approaches are required to be adapted by the business organization. Proper security will prevent the unauthorized users while they will try to access data from the data server of the business organizations. The database security approaches are as follows:
Encryption: The business organizations should adapt accurate encryption key so that none of the external attackers will come and access the data from the data server. Depending on the quality of data public key and private keys should be used by the higher authority (Lam et al. 2016). Public keys are easy to access on the other hand the private keys are more secured. Therefore, proper keys are required to be used so that, external attackers cannot decrypt the information.
Roles and responsibilities of a Database Administrator
Authentication: This is another important aspect of data security. Authentication with accurate identity and password is referred to as another technology that helps to keep the data security (Wu et al. 2014). In this case, only the officially authorized users will be able to access data from the server. For large business organizations, SSH key connection with password is needed to be used. This technology will help to keep the security of both server side and client’s side.
Conclusion
From the overall discussion it could be concluded that as the rate of emerging technology is increasing rapidly thus in proper place their appropriate applications are also becoming necessary to be used. Three major technologies such as big data analytical tools, business intelligence and database management system are widely used by different business organizations to manage large set of data. Apart from benefits these technologies are facing several challenges after the adaptation of these technologies. In order to overcome the challenges certain technological driver such as robotics, RFID are also currently using by the large business organizations. The protection and safeguard of the data server, the roles and responsibilities of the DBA are required to be played accurately so that the adapted Information System (IS) performs accurately resulting effective business revenue.
Development of the technology usage: The existing technologies are required to be improved to develop the entire information System (IS).
Comprehensive technology planning: Comprehensive technology is required to be panned by the developers, so that the existing system could adapt the required changes appropriately.
Training and development: The management team must adapt accurate training and development programs for the employees so that they could utilize the new emerging technologies in accurate place properly.
Security key: Different security keys such as encryption, authentication tools are required to be adapted by the business organizations so that it could keep the data confidentiality.
References
Bajaj, S. and Sion, R., 2014. Trusteddb: A trusted hardware-based database with privacy and data confidentiality. IEEE Transactions on Knowledge and Data Engineering, 26(3), pp.752-765.
Busby, J.W., Cook, K.H., Vizy, E.K., Smith, T.G. and Bekalo, M., 2014. Identifying hot spots of security vulnerability associated with climate change in Africa. Climatic change, 124(4), pp.717-731.
Cardenas, A.A., Manadhata, P.K. and Rajan, S.P., 2013. Big data analytics for security. IEEE Security & Privacy, 11(6), pp.74-76.
Chen, C.P. and Zhang, C.Y., 2014. Data-intensive applications, challenges, techniques and technologies: A survey on Big Data. Information Sciences, 275, pp.314-347.
Demchenko, Y., Grosso, P., De Laat, C. and Membrey, P., 2013, May. Addressing big data issues in scientific data infrastructure. In Collaboration Technologies and Systems (CTS), 2013 International Conference on (pp. 48-55). IEEE.
Hashem, I.A.T., Yaqoob, I., Anuar, N.B., Mokhtar, S., Gani, A. and Khan, S.U., 2015. The rise of “big data” on cloud computing: Review and open research issues. Information Systems, 47, pp.98-115.
Hu, R., Dou, W. and Liu, J., 2014. Clubcf: A clustering-based collaborative filtering approach for big data application. IEEE transactions on emerging topics in computing, 2(3), pp.302-313.
Inukollu, V.N., Arsi, S. and Ravuri, S.R., 2014. Security issues associated with big data in cloud computing. International Journal of Network Security & Its Applications, 6(3), p.45.
Jagadish, H.V., Gehrke, J., Labrinidis, A., Papakonstantinou, Y., Patel, J.M., Ramakrishnan, R. and Shahabi, C., 2014. Big data and its technical challenges. Communications of the ACM, 57(7), pp.86-94.
Lam, S.K., Sleep, S., Hennig-Thurau, T., Sridhar, S. and Saboo, A.R., 2016. Leveraging Frontline Employees’ Small Data and Firm-Level Big Data in Frontline Management An Absorptive Capacity Perspective. Journal of Service Research, p.1094670516679271.
Li, J., Chen, X., Li, M., Li, J., Lee, P.P. and Lou, W., 2014. Secure deduplication with efficient and reliable convergent key management. IEEE transactions on parallel and distributed systems, 25(6), pp.1615-1625.
Malik, M. and Patel, T., 2016. DATABASE SECURITY-ATTACKS AND CONTROL METHODS. International Journal of Information, 6(1/2).
Pathak, A.R. and Padmavathi, B., 2014. Analysis of security techniques applied in database outsourcing. Proc. of International Journal of Computer Science and Information Technologies, 5(1), pp.665-670.
Rittinghouse, J.W. and Ransome, J.F., 2016. Cloud computing: implementation, management, and security. CRC press.
Terzi, D.S., Terzi, R. and Sagiroglu, S., 2015, December. A survey on security and privacy issues in big data. In Internet Technology and Secured Transactions (ICITST), 2015 10th International Conference for (pp. 202-207). IEEE.
Wu, X., Zhu, X., Wu, G.Q. and Ding, W., 2014. Data mining with big data. ieee transactions on knowledge and data engineering, 26(1), pp.97-107.
To export a reference to this article please select a referencing stye below:
My Assignment Help. (2021). The Importance Of Database Management System In A Business Organization Essay.. Retrieved from https://myassignmenthelp.com/free-samples/pm304-information-systems-management/big-data.html.
"The Importance Of Database Management System In A Business Organization Essay.." My Assignment Help, 2021, https://myassignmenthelp.com/free-samples/pm304-information-systems-management/big-data.html.
My Assignment Help (2021) The Importance Of Database Management System In A Business Organization Essay. [Online]. Available from: https://myassignmenthelp.com/free-samples/pm304-information-systems-management/big-data.html
[Accessed 19 August 2024].
My Assignment Help. 'The Importance Of Database Management System In A Business Organization Essay.' (My Assignment Help, 2021) <https://myassignmenthelp.com/free-samples/pm304-information-systems-management/big-data.html> accessed 19 August 2024.
My Assignment Help. The Importance Of Database Management System In A Business Organization Essay. [Internet]. My Assignment Help. 2021 [cited 19 August 2024]. Available from: https://myassignmenthelp.com/free-samples/pm304-information-systems-management/big-data.html.