7BDIN003W Information Management Assignment Sample
Here’s the best sample of 7BDIN003W Information Management Assignment, written by the expert.
In the modern context of increasing information technology and rapidly advancing technology, information management has become an important and crucial aspect of the success of any web-based application or organization. As defined by Vibhoret al. (2019), Information Management refers to the process by which information is stored and accessed in a manner by which it can be provided to the user properly in a correct manner. It is used to develop, design, and manage data in a manner that it can be provided and displayed to customers in an efficient manner. As argued by Lim (2016), for this purpose, a variety of technologies are available which can be used.
In this essay, three such aspects of information management: cloud computing, data analytics, as well as security have been discussed. An organization has been selected for analysis and the impact of these three aspects on the information management strategies and performance of the business has been measured. In addition to that, the competitive advantage that is available to the organization, Google Search Engine, by employing these practices will also be discussed in detail. The essay will then be concluded.
Velte and Velte (2019) have evidenced that Cloud Computing refers to the availability of computer system resources such as memory, to a user on-demand, without any direct or active management being done or undertaken from the part of the user. This is usually done over the Internet, and can be used to provide secure data centers to a variety of individuals. As stated by Rittinghouse and Ransome (2016), the two main types of clouds that are in common use are enterprise clouds and public clouds. Enterprise clouds are used to store only organizational data. They are generally accessible to all employees unless otherwise designated by the person uploading them, therefore they can be used by different members of the organization to access data that may be needed by them.
Public clouds, on the other hand, are available to all individuals who wish to access them, and everyone can store their data here. It can only be accessed by that particular user, and whomever that user chooses to share their data with. Marinescu (2017) has researched that through the usage by multiple users as well as through several access points, cloud computers generally aim to obtain economies of scale and reap the benefits of lower costs.
The various advantages of cloud computing include the fact that it enables small businesses to get up and running without requiring much infrastructure in terms of Information Technology. Clouds are also easier to manage, and have less lags and other similar issues. Data can also be shared easily through this method. However, Almorsyet al. (2016) has argued that the best factor is that the maintenance requirements of clouds are very low.
Usually, the pricing models employed by Clouds are the pay-as-you-go model, which means that the user pays for the amount of data they store or the space they take up on the cloud. This implies that in the organizational setting, the administrators as well as the employees must be aware of the data that is being uploaded on the cloud, thereby avoiding any unnecessary operating expenses or costs.
As stated by Wambaet al. (2017), data analytics is the process of analysing data in such a manner that conclusions can be drawn from the data, which are then used in analysis, machine learning, or other data analysis methods. Most of the processes and the methods that have been employed for the data analytics process have been developed into algorithms that function on their own and convert raw data from computers into a form that is understandable and useful to humans. These techniques can sift through data and present information that would otherwise be difficult to obtain. This information is then subjected to further analysis, and this can be used to gauge the total efficiency or effectiveness of a particular system.
Data analytics, as identified by Dai et al. (2019), is a term that is collectively used in order to refer to any process that aims at processing raw data to convert it into a form that can be easily understood and to get an insight into the data. For example, in factories, the runtime of factories is recorded and then analysedin order to identify if there are any lags in the productivity of the machines and if there is anything that could be done to improve this. Without data analytics, it would be very hard to study the data and draw any meaningful insights from it.
Wang et al. (2016) has identified the steps in data analytics as follows: the first step in the process of data analytics is to identify the data and see the criteria that have been used to group the data. This could be criteria like gender, age group, nationality or any other criteria. The second step is to collect the data that has been identified in the previous step. After the collection of data, the process of organizing the data begins so that the data can be reduced into a form which is easy to analyse. The final step is to then clean up the data and remove any duplications or incomplete data. After this, the data is fed into the machine and analysed.
Peltier (2016) has argued that security of information is one of the most crucial aspects of the process of information management, as it helps to maintain the confidentiality of the information that has been obtained from the public, and ensure that this information is not misused by hackers with malicious intentions. This is even more true for organizations that have security features and sensitive information like contact details, addresses, and payment information. Therefore, as evidenced by Soomro et al. (2016), many organizations choose to employ softwares for the protection of their data known as Information Security Management System, which is designed in such a way as to help protect the security and the safety of an organization. This system is constantly revised and updated, so that it can continue to monitor and deal with the threats that are being faced by the company.
This is done in order to avoid a security breach. If the data that is being managed or stored by a company is leaked to hackers and the confidentiality of the customer data is compromised, then this will result in a huge loss to the image and goodwill of the company. It may also result in several customers opting to leave the organization and going elsewhere due to the lax security features of the organization. It may open up the organization to various civil claims and legal troubles. To avoid all this, it is essential that the organization works to minimise its security risks by storing all its information in a safe and secured database. These days, having a good Information Security Management System is also a criteria for getting a standardisation certificate for the organization, thereby making it all the more important.
Role of Information Management in Google Search Engine
As evidenced by Hirve and Reddy (2019), information management is a very crucial part of the business and developmental strategy that has been adopted by the Google Search Engine, and is one of the main reasons for the dominant position that Google has as compared to other lesser-known search engines such as Bing or Yahoo.
Google provides its users with Google’s very own Cloud Computing services, which give it a massive advantage over its competitors. This also helps build up the brand name of Google, whilst ensuring that all the organizations that use Google Cloud will also automatically use Google as their default search engine. The Google cloud facility is used by several top firms and companies around the world across different sectors such as Spotify, Toyota, and PayPal. This has led to a huge surge in the traffic of Google, and thereby contributed to the popularity of Google as a search engine.
Kaur et al. (2017) have argued that Google Search Engine has also used data analytics tools to the maximum potential. For itself, Google sifts through millions of different search results and then prioritises them on the basis of a variety of factors such as the geographical location, the keywords used, as well as the age and gender of the person searching for the query. This is done by Google having access to the search histories of everyone who searches anything on Google. Through this, a general idea can be formed of what people are looking for in a particular region or within a particular demographic. This, coupled with the use of the browsing history and patterns of the individuals, can help Google to provide the best and most relevant search results, making its process of data analytics very useful.
Google also offers data analytics services to other websites so that they can track their visitors and viewers, and then alter their content accordingly in a manner that will permit these websites to get more traffic and traction. This is another factor that has contributed in Google becoming among the top search engines preferred by a lot of people around the world.
As far as the third factor is concerned, security, Google takes its security very seriously. Since Google has access to people’s search histories, their payment details, locations, passwords etc. it is of paramount importance for Google that they keep the data of their customers safe and sound. This is done through a variety of means. The first and most important one is that Google never sells the data of its users to third parties so that they can use it for advertisement and research purposes. This is done in order to maintain the privacy of the people who have trusted Google Search Engine with their privacy and their information. The data centers run by Google where all the data is stored is also equipped with high-level security so that any data breach is very difficult. The safety and security software installed is constantly monitored by cybersecurity experts, and it is constantly updated so that it is in a position to combat all sorts of threats.
Thus, Google Search Engine uses information management in a very efficient and useful manner which gives it a huge competitive advantage over other search engines. This competitive advantage, discussed in the next section of the essay, is what has made Google the most preferred search engine in the world.
As stated by Lim (2017), Google has several distinct competitive advantages over its customers by virtue of its information management technologies and their application. The first and foremost is that Google search results are always relevant to what the person is searching for, since the order is determined by a variety of factors that take into account several details about the user. This reduces the time needed for the user to search, since the user does not have to worry about searching for the right result. Another major factor that provides Google with a massive advantage is that it has a cloud computing service that directs a massive amount of traffic towards it. This is an advantage that is not available to other similar search engines. Google Search Engine also has a top-notch security system due to its high budgets and availability of qualified personnel, something which is unaffordable and difficult to obtain for other search engines.
As part of the concluding remarks, three major aspects of information management were discussed in this essay: Cloud Computing, Data Analytics, and Informational Security. Cloud Computing refers to shared storage space that is provided to users on the Internet, which makes sharing of data between individuals easier. Data Analytics refers to the process of processing and managing data in such a manner that meaningful insights and conclusions can be drawn from it. Finally, informational security refers to keeping the data safe and secure in such a way that it cannot be accessed by unauthenticated users. This is done to maintain the privacy of the data as well as the customers.
Google uses information management tools very efficiently in order to boost its market share as well as its pool of users. In addition to offering its own cloud service which is very popular and used by companies, Google also uses data analytics in order to provide search results which are the most relevant to the user, thereby making it a preferable search engine as compared to other search engines. It is also very particular about safety, and it has a top-notch security structure in addition to a strong data safety policy that is strictly enforced throughout the company.
As a part of this project, I have gained a greater understanding into the various aspects of information management, such as cloud computing, data analytics, as well as information safety and security. I have learnt about how and why cloud computing is useful, and how it can help boost productivity in organizations by creating a work environment in which data can be shared and accessed by different individuals seamlessly. I have studied data analytics, and gained a deeper understanding into the data analytics process and methodology. In addition, I have also analysed the importance of data security, and what the possible risks of a data breach in security could be for a company or for its customers.
All of this helped me in gaining a deeper understanding into how information management works, and how these aspects are integrated into one big system that ensures proper coordination and management of data in an efficient manner. An organization was selected as a part of the study for this essay, and this helped me understand the functioning and the working of this organization in a much more nuanced manner. It also gave me deeper insight into how information management practices can be used in an organization to ensure the best customer experience while at the same time ensuring the efficient management of data.
The essay and the study allowed me to gain a comprehensive insight into how the Google search algorithm works and how data analytics is used by Google in order to maximise the relevance of the search results that it displays to its users. This essay has also educated me about the importance of complying with data regulation policies. This, while resulting in a few monetary losses, will in fact enable an organization to gain the trust and the confidence of the customers, thus ensuring brand loyalty and also giving the company a distinctive advantage over its competitors. It helped me understand why Google is among the most preferred search engines in the world, and why so many people prefer it the way they do.
Overall, the essay has really fascinated me regarding information management and its application in organizations, and I am eager to learn more about this field through greater and in-depth studies.
Almorsy, M., Grundy, J. and Müller, I., (2016). An analysis of the cloud computing security problem. arXiv preprint arXiv:1609.01107.
Dai, H.N., Wong, R.C.W., Wang, H., Zheng, Z. and Vasilakos, A.V., (2019). Big data analytics for large-scale wireless networks: Challenges and opportunities. ACM Computing Surveys (CSUR), 52(5), pp.1-36.
Hirve, S. and Reddy, C.P., (2019). A Survey on Visualization Techniques Used for Big Data Analytics. In Advances in Computer Communication and Computational Sciences (pp. 447-459). Springer, Singapore.
Kaur, V., Tyagi, A., Kritika, M., Kumari, P. and Salvi, S., (2017), February. Crowd-sourcing based android application for structural health monitoring and data analytics of roads using cloud computing. In 2017 International conference on innovative mechanisms for industry applications (ICIMIA) (pp. 354-358). IEEE.
Lim, K., NEXTLABS Inc, (2016). Analyzing activity data of an information management system. U.S. Patent 9,407,662.
Peltier, T.R., (2016). Information Security Policies, Procedures, and Standards: guidelines for effective information security management. CRC Press.
Rittinghouse, J.W. and Ransome, J.F., (2016). Cloud computing: implementation, management, and security. CRC press.
Soomro, Z.A., Shah, M.H. and Ahmed, J., (2016). Information security management needs more holistic approach: A literature review. International Journal of Information Management, 36(2), pp.215-225.
Velte, A.T. and Velte, T.J., (2019). Cloud computing: a practical approach. McGraw-Hill.
Vibhor, A., Mehta, B.B. and Karandikar, A.V., CommVault Systems Inc, (2019). Work flow management for an information management system. U.S. Patent 10,169,121.
Wamba, S.F., Gunasekaran, A., Akter, S., Ren, S.J.F., Dubey, R. and Childe, S.J., (2017). Big data analytics and firm performance: Effects of dynamic capabilities. Journal of Business Research, 70, pp.356-365.
Wang, G., Gunasekaran, A., Ngai, E.W. and Papadopoulos, T., (2016). Big data analytics in logistics and supply chain management: Certain investigations for research and applications. International Journal of Production Economics, 176, pp.98-110.
Know more about UniqueSubmission’s other writing services: