Database, Big Data and Business Intelligence

Storage and Protection of Business Data 1
STORAGE AND PROTETION OF BUSINESS DATA
Name:
Tutor:
Course
City and State:
Date:
Storage and Protection of Business Data 2
Table of Contents
Introduction ................................................................................................................................... 3
Database, Big Data, and Business Intelligence ........................................................................... 3
Database ...................................................................................................................................... 3
Big data ....................................................................................................................................... 4
Business Intelligence ................................................................................................................... 4
How Information Systems Support Decision Making In Organization ...................................... 5
Information .................................................................................................................................. 5
Business Case Scenarios ............................................................................................................... 6
Projections ................................................................................................................................... 6
Implementation............................................................................................................................ 6
The Protection and Safeguarding Of Organizational Databases ............................................. 7
Automate Back-Ups and Build Offsite Redundancies ................................................................ 7
Server Virtualization ................................................................................................................... 8
Run a Full-Service Security Suite ............................................................................................... 8
Have a Big Picture Disaster Preparedness Plan .......................................................................... 9
Conclusions .................................................................................................................................... 9
References .................................................................................................................................... 10
Storage and Protection of Business Data 3
Introduction
The understanding and application of big data, databases and business intelligence are
increasingly becoming important to both business and academic communities. With the current
vast amount of data (big data) in the business environment as facilitated by technological
connectivity, big data analysis using business intelligence to uncover market trends, hidden
patterns, correlations and other important business information is critical for success in a
competitive business environment. To reap the full benefits of big data analytics and business
intelligence, it is not only critical for businesses to understand the importance of their stored data
security, but also how the information system can support organizational decision making. This
paper a discussion on the database, big data and Business Intelligence within the organizational
context, additionally, the paper will give a discussion on how information systems support
decision making in the organization, as well as how organizations can protect and safeguard their
databases.
Database, Big Data, and Business Intelligence
Database
A database is fundamentally an accumulation of data composed in a manner that a PC
program can rapidly choose fancied bits of information. A database can be understood as an
electronic recording framework.
Customary databases are composed are fields, records, and documents. A field is a single
piece of data; a record is one finished arrangement of fields, and a document is an accumulation
of records. For instance, a phone directory is practically equivalent to a record. It contains a
rundown of records, each of which comprises of three fields: name, address, and phone number.
Organizations interact and process big amounts of data on a daily basis while making different
Storage and Protection of Business Data 4
decisions. Storage of such data is critical in future decision making; therefore, it is vital for any
organization to have an effective means of storing its data. It the current digital world, databases
have proved to be the most efficient way of storing data (Coronel & Morris, 2016). To access
data in a database, one requires a database management system (DBMS); this a software
application that allows users you to enter, compose, and select data in a database.
Big data
Big data is a term that describes the expansive volume of information both organized and
unstructured that immerses a business on an everyday premise. Be that as it may, it's not the
measure of information that is critical, it what organizations do with the information that matters.
Big data can be broken down to bits of knowledge that prompt to better choices and vital
business moves. Big data is regularly described by 3Vs: the extreme volume of information, the
wide assortment of information sorts and the speed at which the information must be handled
(Vossen, 2014). Albeit enormous information doesn't liken to a particular volume of information,
the term is regularly used to portray terabytes, petabytes and even exabytes of information
caught after some time.
Business Intelligence
Business intelligence (BI) is an innovation driven process for investigating information
and introducing noteworthy data to help corporate officials, business administrators and flip side
clients settle on more educated business choices (Debortoli, Muller & vom Brocke, 2014). BI
includes a wide assortment of devices, applications, and techniques that empower associations to
gather information from inner frameworks and outer sources. It aids in setting up such
information for examination, create and run questions against the information, and make reports,
Storage and Protection of Business Data 5
dashboards and information representations so as to make the information outcomes accessible to
corporate leaders and also operational laborers (Vossen, 2014).
The potential advantages of business knowledge programs incorporate quickening and enhancing
basic leadership; upgrading inside business forms; expanding operational effectiveness; driving
new incomes; and increasing upper hands over business rivals (Demirkan & Delen, 2013). BI
frameworks can likewise help organizations recognize advertise patterns and spot business issues
that should be tended to.
How Information Systems Support Decision Making In Organization
Management information system or decision support systems join equipment,
programming and system items in an incorporated arrangement that gives directors information
in an organization appropriate for investigation, observing, basic leadership and detailing
(Galliers & Leidner, 2014). The framework gathers information, stores it in a database and
makes it accessible to clients over a safe system.
Information
When an organization constructs choices in light of management information accessible
from data management frameworks, they reflect information that originates from the operations
of the organization (Baltzan & Phillips, 2016). Management decision support systems take
information produced by the organization working level and arrange them into valuable
configurations. Decision support systems take in business figures like costs, ventures and
workforce information, processes them to give the best possible course of actions that can be
taken based on the business figures (Pettigrew, 2014). On the off chance that there is a need to
know how much profit an organization has made in a financial year or over the years so as to
Storage and Protection of Business Data 6
make informed decisions, management information data frameworks can give precise reports
giving you that data
Business Case Scenarios
The ability to run scenarios is a key basic leadership apparatus. Some decision support
systems have this component worked in, while others can give the data required to running
scenarios on different applications, for example, spreadsheets (Xu, Da Xu, Cai, Hu & Bu, 2014).
A business choice is affected by what happens on the off chance that a specific way path is
chosen. Imagine a scenario in which there is a demonstration on how diverse factors change
when a specific choice is settled upon. A business can enter lessened staff levels or expanded
advancement spending plans to see what happens to income, costs, and benefit from various
levels of cuts or increments. Management information systems assume a basic part in making
reasonable scenarios conceivable.
Projections
Any choice a business rolls out, there is always an expectation in outcome improvements
and may oblige alterations to your business system and general objectives. Management
information system either have to drift examination worked in or can give data that gives a
business a chance to do such an investigation (Pettigrew, 2014). Run of the mill business
methodologies incorporates projections for all essential working outcomes. A pattern
investigation permits the visualization on what such outcomes would be in the present
circumstance, and how they will change once executed based on the choices taken (Galliers &
Leidner, 2014). The new values shape the premise of the key approaches taken by the business.
Implementation
Storage and Protection of Business Data 7
When a business settles on a choice based on particular objectives and has the
documentation from management information system and pattern investigation to bolster the
desires, there is a need to track organization results to ensure they do not deviate from the plan
(Laudon & Laudon. 2013). Management information system avails the information needed to
figure out if the selected choices have had the coveted impact, or whether there is a need to make
a remedial move to achieve your objectives (Scott & Davis, 2015). On the off chance that
particular outcomes are not on track, management information system can be utilized to assess
the circumstance to facilitate the taking of extra measures if necessary.
The Protection and Safeguarding Of Organizational Databases
Organizations often strive to ensure that their data is not lost or is retrievable in case of a
calamity happen; however, loops are inevitable. It is critical that any organization’s data is
protected particularly organizations dealing with sensitive client information, for example,
money related data. For this reason, it is essential for business organizations to have a formal
crisis or disaster readiness and recovery plan (Gibson & Holland, 2014).
Moving down nearby may not be adequate to shield independent companies from cataclysmic
events especially if the business is situated in a region inclined to hurricanes and flooding
emergencies. The improvement of a readiness plan that incorporates answers for securing basic
data, such as, backing data off-line (Zsambok & Klein, 2014), could be the difference between
getting a business on its approach to recuperation and stressing over its survival. The following
four ways can be used to protect organizational data
Automate Back-Ups and Build Offsite Redundancies
Ensuring there is a copy of an organizational database is an absolute necessity for
organizational survival (Demirkan & Delen, 2013). Though the cost of having a duplicate copy
Storage and Protection of Business Data 8
of a database may be significantly high; the estimation of buying a hard drive that will store
terabytes of information is about $100; however, this cannot be compared to the cost of losing
organizational data in case of a catastrophe. Organizations ought to likewise consider moving
down to an outsider or off-site backup. In the event that business information is obliterated in a
catastrophe, the business will have the genuine feelings of serenity of realizing that the
information is retrievable. Cloud back-ups are increasingly becoming common among the
present organizations (Laudon & Laudon, 2013).
Server Virtualization
Currently, most organizations have virtualized their servers as a way of securing their
data in case of a catastrophe. This move comes with enhanced information security referred to as
an immediate advantage (Deshmukh, Pasha, Qureshi, 2013). Server virtualization permits
organizations to take one physical server and run a few virtual server conditions, for instance,
your email, database, and web servers on it. Basically, one server plays out the work of
numerous. Alongside money-saving advantages, virtualization likewise makes catastrophe
recuperation less demanding (Zsambok & Klein, 2014).
Run a Full-Service Security Suite
Protecting information is about more than supporting it up. Interruption endeavors, PC
infections, and malware all can undermine business information. Considering the introducing an
equipment firewall can be a sure way of securing organizational data (Alruwaili & Gulliver,
2014). Most frameworks will attempt to ensure the security of data; however, such measures may
not be sufficient for both external and internal threats. However, firewalls are actuated; the risk is
minimized to only the risks (Jager, Monitzer, Rieken, Ernst & Nguyen, 2014). A protected
Storage and Protection of Business Data 9
machine-based firewall between the Internet and the business information will filter gate crashers
and dangers before they enter the organizational system.
Have a Big Picture Disaster Preparedness Plan
Between 40-60% of private companies never revive their entryways after a catastrophe
(Chavhan, Wankhade & Tagalpallewar, 2013). While the estimation of business information is
endless, having a plan on how to secure or retrieve business and clients’ data is a guarantee that a
business is ready up for the consequence of man-made or natural catastrophes. It is critical to
have a plan in place to reduce the effect of calamities, and a debacle recuperation plan to
guarantee the business is operational sooner after a calamity.
Conclusions
The business application of big data is increasingly growing as businesses devote their
resources towards tapping vast information flowing into their organizations. This has a
tremendous effect on business intelligence and how such data is stored. The ability to store and
retrieve, as well as, to recover data in case of a calamity is critical for the success of any
organization. Stored data (database) can be useful to an organization in making business
projections and creating simulated business scenarios. With the aid of Business Intelligence, this
enables business executives to test different scenarios before their implementation. An
organizational database can be protected and safeguarded through, automate back-ups and build
off-site redundancies, server virtualization, run a full-service security suite and have a big picture
disaster preparedness plan.
Storage and Protection of Business Data 10
References
Alruwaili, F. F., & Gulliver, T. A. 2014., Safeguarding the Cloud: An Effective Risk
Management Framework for Cloud Computing Services.International Journal of
Computer Communications and Networks (IJCCN), 4(3), 6-16.
Baltzan, P., & Phillips, A. 2016., Business driven information systems. McGraw Hill Education.
Chavhan, N. B., Wankhade, P. J., & Tagalpallewar, S. K. (2013). Implementation of data leakage
detection & protection using allocation strategies. International Journal for Engineering
Applications and Technology, 174-181.
Coronel, C., & Morris, S., 2016. Database systems: design, implementation, & management.
Cengage Learning.
Debortoli, S., Müller, O., & vom Brocke, J., 2014. Comparing business intelligence and big data
skills. Business & Information Systems Engineering, 6(5), 289-300.
Demirkan, H., & Delen, D., 2013. Leveraging the capabilities of service-oriented decision
support systems: Putting analytics and big data in cloud. Decision Support
Systems, 55(1), 412-421.
Galliers, R. D., & Leidner, D. E., 2014. Strategic information management: challenges and
strategies in managing information systems. Routledge.
Gibson, N., & Holland, G., 2014. A dual-database trusted broker system for resolving protecting
and utilizing multi-sourced data. In Information Quality and Governance for Business
Intelligence (pp. 352-362). IGI Global.
Jager, H. A., Monitzer, A., Rieken, R., Ernst, E., & Nguyen, K. D., 2014. Sealed cloud-a novel
approach to safeguard against insider attacks. InTrusted Cloud Computing (pp. 15-34).
Springer International Publishing.
Storage and Protection of Business Data 11
Laudon, K. C., & Laudon, J. P., 2013. Management Information Systems 13e.
Pettigrew, A. M. (2014). The politics of organizational decision-making. Routledge.
Scott, W. R., & Davis, G. F., 2015. Organizations and organizing: Rational, natural and open
systems perspectives. Routledge.
Vossen, G., 2014. Big data as the new enabler in business and other intelligence. Vietnam
Journal of Computer Science, 1(1), 3-14.
Xu, B., Da Xu, L., Cai, H., Xie, C., Hu, J., & Bu, F., 2014. Ubiquitous data accessing method in
IoT-based information system for emergency medical services. IEEE Transactions on
Industrial Informatics, 10(2), 1578-1586
Zsambok, C. E., & Klein, G., 2014. Naturalistic decision making. Psychology Press
.

Place new order. It's free, fast and safe

-+
550 words

Our customers say

Customer Avatar
Jeff Curtis
USA, Student

"I'm fully satisfied with the essay I've just received. When I read it, I felt like it was exactly what I wanted to say, but couldn’t find the necessary words. Thank you!"

Customer Avatar
Ian McGregor
UK, Student

"I don’t know what I would do without your assistance! With your help, I met my deadline just in time and the work was very professional. I will be back in several days with another assignment!"

Customer Avatar
Shannon Williams
Canada, Student

"It was the perfect experience! I enjoyed working with my writer, he delivered my work on time and followed all the guidelines about the referencing and contents."

  • 5-paragraph Essay
  • Admission Essay
  • Annotated Bibliography
  • Argumentative Essay
  • Article Review
  • Assignment
  • Biography
  • Book/Movie Review
  • Business Plan
  • Case Study
  • Cause and Effect Essay
  • Classification Essay
  • Comparison Essay
  • Coursework
  • Creative Writing
  • Critical Thinking/Review
  • Deductive Essay
  • Definition Essay
  • Essay (Any Type)
  • Exploratory Essay
  • Expository Essay
  • Informal Essay
  • Literature Essay
  • Multiple Choice Question
  • Narrative Essay
  • Personal Essay
  • Persuasive Essay
  • Powerpoint Presentation
  • Reflective Writing
  • Research Essay
  • Response Essay
  • Scholarship Essay
  • Term Paper
We use cookies to provide you with the best possible experience. By using this website you are accepting the use of cookies mentioned in our Privacy Policy.