Protection of People

Often the most vulnerable aspect of your enterprise is not your technology systems, instead it’s the weaknesses introduced by staff that are often the hardest to find yet the most harmful. Your staff might be simply unaware of what their security obligations are, or they might be complacent about security controls or internal procedures because […]
Protection of Systems

When we read about hacking in the news, we usually hear that massive corporates or government departments have been breached and some kind of corporate database has been stolen. We truly live in the age of the data breach , were hackers break into an organization’s infrastructure and purloin millions of records of personal information, […]
Protection of Information

Performing a risk assessment is one of the fundamental tasks you’ll perform when considering which protection mechanisms should be used to defend your information. We looked at risk assessments in Chapter 4, so you should be fairly familiar with how to undertake one of these by now; however, one thing that wasn’t covered back then […]
Communicating persuasively

Communicating persuasively may be a tricky art to perfect, but when it’s done properly, the payoff can be huge, which is why marketing campaigns continue to siphon off huge amounts of corporate money every year. If you want your message to reach and influence your target audience there is one golden rule you must follow: […]
Business Process Management Market Report

Business Process Management Market – Global Market size, share, Trend Analysis, Western Market Research Report Business Process Management Market Report is expected to grow at CAGR XX% by 2028. Business Process Management Market Report was $XX Million in 2020 and is expected to reach $XX Billion by the forecasted period 2021 to 2028. The Business […]
What Is Business Intelligence?

BI has multiple definitions in multiple publications. The Wikipedia definition for BI is this: “Business intelligence is a set of theories, methodologies, architectures, and technologies that transform raw data into meaningful and useful information for business purposes.” In our opinion this is a very interesting definition because it shows a full image of a BI […]
Managerial Support Systems

Managerial support systems are the topic of this second of three chapters devoted to our survey of information technology (IT) application areas. Managerial support systems are designed to provide support to a specific manager or a small group of managers, and they include applications to support managerial decision making such as group support systems, executive […]
DECISION SUPPORT SYSTEMS

A decision support system (DSS) is a computer-based system, almost always interactive, designed to assist a manager (or another decision maker) in making decisions. A DSS incorporates both data and models to help a decision maker solve a problem, especially a problem that is not well structured. The data are often extracted from a transaction […]
What Is the Difference Between Privacy and Anonymity?

Privacy and anonymity are two different concepts; however, both are essential in today’s digital world. Privacy means that online communications are confidential and no third party is allowed to intercept them in any way. Following this definition, the main concern of privacy is to keep the content of the online communication private. For example, when […]
ENTERPRISE SYSTEMS

Enterprise systems are one of the most complex and powerful information systems in use today. ARCHITECTURE OF ENTERPRISE SYSTEMS The architecture of an enterprise system refers to the technical structure of the software, the ways that users interact with the software, and the ways the software is physically managed on computer hardware. Most modern ES […]