Terminologies and Key Elements of Data Mining
1.
They are for the manufacturing which involves the disruptions in the supply chain at times. The strategy is based on the increased efficiency and decreasing the waste by receiving the goods only if they are for the production processes, which will lead to the reduction of the inventory costs.
- E-Commerce;
It is the method for buying or then selling the different goods and the services which are based on handling or transmitting the funds in the electronic network. There are different business transactions which are for the consumer to consumer, B2C, B2B. (Bohrweg, 2014).
- SaaS;
It is one of the important type of the cloud computing technique that is based on connecting to and using the cloud based applications for the internet. The examples are the email, calendaring and the other office tools.
- Strategic planning;
It includes the handling of the organisation processes with the defined patterns and the strategy which are for making important decisions and working on pursuing with the different controlled strategy. The description is about the process to set the goals.
- Supply Chain systems;
It includes the different patterns and the information standards for better approach to the activities, products and the different services. They involve the products or the services that comes from different suppliers to the customer. (Palshikar et al., 2013)
- DSS;
This includes the different information patterns for the computer systems which are able to support the business as well as the other activities which are important for handling the decision-making processes.
- Cloud infrastructure;
The structure is based on delivering and accessing the network services on the Internet. It includes the processing with the on-demand services which includes the support of the cloud computing requirements with networking gear and the storage resources.
- Web 2
Web 2.0 is for the World-Wide Websites which focus on the content that has been generated by the user. It includes the interoperability which is for the proper production and handling of the systems, and the devices. This works for the end users to work on allowing the users to interact and cooperate.
- Extranet;
This includes the accessing of information with the authorisation that is mainly found to be out of the users. It includes the business patterns as well as the other information flow in the network over a secured area. (Aniyie, 2013).
- Big data analysis.
It includes the structuring and un-structuring based on the analysis to reveal the patterns the human behaviour and the other interactions.
2. The elements and examples are:
Understanding the Significance of Reserve Stock Level in ERP system
i. The applications of the statistics and the data mining. The example is related to the quality and the completeness of the model. It includes the OLAP, financial and the statistical functions for the data collected.
ii. Plug and play architecture for the customised analytical functions. Here, the example is based on organisations which work towards the productivity calculations with handling the standards of the mathematical functions.
iii. The integration is done with the data mining tools and the discovery is based on the patterns for the segmentation, regression, clustering and the forecasting.
iv. The collaboration technology is for the operations based on the collaborative handling and the calculations. The automatic collaboration is mainly to overcome any of the database limitations. (Barata, 2011).
v. The multi-pass SQL works with the normal business operations example the ranking and the contributions.
3. There is inefficiency which mainly includes the details related to the import of the data, integration of the different interfaces and working on delivery of the data which is guaranteed. The standards are set for the safety stock which is for the protection against any of the uncertainties and working on the buffer against any of the same. The constant inventory records are mainly to focus on the stock loss with compensating the errors. ERP works on the new warehouse patterns with the new products and the product availability data that includes the references for the warehouses.
4. A1: The business is based on the IT facilities and how the company is not able to handle the different forms of the increased volume of data. For this, there are different systems which include and require a better maintenance where the efforts are set to handle the loss of employee productivity. (Gorbacheva et al., 2011). It also includes the affecting of the business core processes and working over proper handling of the order processing as well as the other management of the inventory standards.
A2: There is a foundation of some of the insufficient IT infrastructure which has a negative impact on the system. It includes the lack of the capacity which results in the customer loss and the orders are also not seen to be processed in time. Hence, it is important to work on the information management systems with properly handling the processes that includes the setup of the processing as well as the management of the inventory patterns.
Business Continuity with Virtualization
A3: The virtualisation of server takes hold of the reduced physical servers which vary differently. The applications tend to run fast with the proper utilisation of the process. It also includes the results which relate to the better standards of customer services and the management of inventory. With this, there is also certain reduction processes with the physical servers to handle the savings and the other hardware replacement for properly handling the power consumption reduction processes. (Pena, 1996).
5.
- What data and IT problems were limiting FinCEN’s ability to fight financial crime?
There are issues related to the FinCEN’s department where the major focus is to handle the data along with the inconsistent quality which leads to the lack in validation or the standardisation process. It includes the setup and the analysis based on the formats that are related to the smaller number of datasets. It works on how the analysis could be conducted depending upon the reporting of the data and how the agencies are able to work on different systems in the offline format. Hence, for this, the combinations are set for FinCEN to properly detect about the different new and the emerging trends that tend to aid and handle the disruption of the different criminal enterprises.
- Describe the IT upgrades and capabilities needed by FinCEN in order to achieve its mission.
FinCEN works on the analytics where the processes include the different infrastructures. The process includes the upgrade of the analytics which needs to work on handling the law enforcement patterns and the technology. (Lukasiewicz, 2015). It includes how FinCEN works towards the improvement of the legacy system where the System of Recodes are for handling the data with their upgraded standards and then converting 11 years of data with proper receiving, processing and storing the process reports. The Web based applications with the new search tools are applied for the regulatory users to work on the timely access formats.
- On what does financial intelligence depend?
It mainly depends on the standards that are based on the proper analysis of the data analytics and how it is possible to work towards the identification of different patterns as well as relationships. They are mainly to reveal the possibility of the potential that could be for eliciting the activities.
- Why is the ability to identify patterns and relationships critical to national security?
The intelligence is based on working over the speeds with complete ability to handle the detection of money launders and the other terrorist’s financers. The disruption of any of the activities in crime also lead to the issues related to the different criminal activities.
- Research recent financial crimes that FinCEN has detected and disrupted. Explain the role of data analytics in crime detection.
FinCEN works on the combatting of the money laundering activities where the focus of the same is to handle and safeguard the financial systems. It includes the functioning where one seeks for the counter terrorists financing which is mainly to identify and handle the flow of the financial disruptions. The standards are set with the use of authority functions that are set in conjugation to law enforcement and the intelligence community. The expansions are related to the processing of the capabilities with the support on the critical setups which leads to successful employment and the unique regulatory authorities. The financial intelligence also play an important role for identifying the connections between the individuals and then work towards the system handling with identifying the carrying out of the future attack. The associates are identified with the law enforcement and the intelligence partners who identify about the engagement in the activities with the terrorism and the terrorist facilitator. The major focus is on how FinCEN is able to handle the financial intelligence and work on the law enforcement activities and intelligence agencies. The setup is to work on the stimulation processes with the collection, and the dissemination of the financial reporting for the multilateral efforts to share information and produce a better operational analysis.
References
Aniyie, I. A. (2013). Economic Crimes and ICT: Old Wine in New Skin.
Barata, F. A. F. J. M. M. (2011). A snapshot of the Portuguese e-banking activity: insights and a conceptual framework to allocate strategic hindrances. International Journal of Electronic Business, 9(3), 238-254.
Bohrweg, N. (2014). University Leiden ICT in Business.
Gorbacheva, E., Niehaves, B., Plattfaut, R., & Becker, J. (2011, June). Acceptance and use of internet banking: a digital divide perspective. In ECIS(p. 126).
?ukasiewicz-Kami?ska, A. (2015). DIGITAL CURRENCIES AND THEIR IMPACT ON MONETARY SYSTEMS. Research Papers of the Wroclaw University of Economics/Prace Naukowe Uniwersytetu Ekonomicznego we Wroclawiu, (397).
Palshikar, G. K., & Apte, M. (2013). Emerging Trends in ICT Security: Chapter 36. Financial Security against Money Laundering: A Survey. Elsevier Inc. Chapters.
Pena, J. D. (1996). Exporting criminality: Money laundering in a domestic and international context. Retrieved from www. webstanford edu. group.