IT KPI and its Advantages and Disadvantages
1:
Particulars |
Definition |
Business intelligence |
It is the set or collection of methods, technologies, processes, and applications for improving the functionality of business |
IT Agility |
The sustainability can be achieved by giving the rapid response to the operating curriculum of the enterprise |
SWOT analysis |
It helps in finding strength, weakness, opportunities, and threats of the enterprise |
Strategic planning |
It is the procedure for developing strategies for achieving the objective of the business |
Enterprise Architecture |
The framework in which the implementation of project phases takes place such as analysis, designing, and implementation |
Management information system |
MIS system provides the required information on demand of the manager for taking quick decision |
MIS and DSS |
Decision support system enhance the decision making capability of the business |
Cloud Infrastructure |
Promotes sharing of resources |
Data and text mining |
It is the process used for accumulation high quality information |
DMS |
It helps in tracking and storing data and information |
Big data |
Large voluminous data |
2. Advantages and disadvantages of Information technologies key performance indicator:
- Comparison of change request:
- Advantages: It is proposal of alternative solution of the given project which helps in enhancing the functionality of the proposed project by adding additional features in the proposal. It helps in providing good quality product to the customers and users.
- Disadvantages: The criticality can occur if associated stakeholder does not get agreed on the proposal of change. The requirement of hardware and software can be changed which can result into exploring the budget of the firm.
- Change Approval proposal:
- Advantages: The approval of change helps in providing facilities to the phases of the project. The conflict on the alternative solutions can be resolved. Non-routine can be systematically handled
- Disadvantages: Problem of priority can occur in approving the proposal which can raise dissatisfaction in employees.
- Sub-services involved in the incident:
- Advantages: The maintenance can be applied to every sub services with ease. The analysis of the sub-modules helps in understanding the requirement.
- Disadvantages: The burden of documentation gets increased on the employees.
- Cost Per contact:
- Advantages: It helps in analysing the cost offered by different vendors.
- Disadvantages: The feeling of vendors can be affected
- Customers Satisfaction:
- Advantages: Customers reviews and feedback helps in improving the quality of the product.
- Disadvantages: Demotivation in the employees can be created by the negative feedback given by the customers.
- Agent utilization:
- Advantages: The valuable contact can be developed by indulging agents.
- Disadvantages: “The agents should be provided with compensation fees” (Young, 2011).
- Agent satisfaction:
- Advantages: Product sale can be increased
- Disadvantages: The reputation of the company can be affected by the behaviour of the agents.
- Aggregate self-desk performance:
- Advantages: The gap can be filled for improving the efficiency of the product.
- Disadvantages: The employees working schedule can get affected.
“SaaS is the technology of Cloud computing used for allocation of resources which are available on the cloud” (Aung, 2013). The thin cloud and web browser are used for accessing the resources from the cloud. The service providers are used for hosting the application on SaaS cloud computing platform. The on-demand software can be hosted on the central database.
Advantages of SaaS |
Disadvantages of SaaS |
Less Cost required: No extra cost is spent on the implementation of the SaaS model |
Problem of security: The confidentiality and privacy of the data can be lost |
Less Hardware required: “The hosting of the application is possible with minimum hardware required” (Rumburg, 2013) |
Problem of latency: The time of accessing the information can be increased |
Low maintenance cost: “The maintenance cost can be minimized with the minimum hardware required for hosting the application” (Sun, 2013) |
Internet dependency: The application need high spend of data connectivity. Sharing of resources can get affected by the failure of the internet. |
Quick implementation: No extra hardware required |
The data stored on the cloud should be according to the requirement of the business. |
4. Risks associated with Liberty wines organization:
The Liberty wines organization implemented virtualization for the continuity of business. The following are the risk associated with the organization:
- Risk associated with securing environment: The threat to security is due to the resource made available to the users. The brute force attack and malware attack can affect the size of the resources.
- Risk associated with the privacy of data: The transmission of resources can data can result into the loss of privacy of the data.
- Data availability risk: Failure in the internet connection can affect the sharing of data.
- Record retention requirement: The clarity is not given priority in storing the record.
- Risk associated with disaster recovery: The resource hosting should be incorporated with recovery plan.
The competitive advantage can be achieved by indulging information technologies with organization infrastructure. The IT infrastructure facilitates top management of the liberty wines in making decision in the welfare of the company’s reputation, quality standard for the productivity, low cost, and others. The implementation of IT infrastructure opens a new door of opportunities for communication. The technology of virtualization plays an important role in making the organization ahead of the competitor. The agenda of the enterprise should be structured according to the new strategic plan of the organization for upgrading the quality of the product.
Server virtualization benefits: “The virtual server provides the new environment of operating system for the application” (Hang, 2015). The performance of the liberty wines can be improved by indulging the technology of multiple virtual servers. The physical server of the organization is partitioned into multiple virtual servers. New operating system is allocated to virtual servers to carry out the functionality of applications. The task of the physical server can be minimized by managing the traffic on virtual servers. The quality of service can be improved of Liberty wines by the availability of the data. The testing of the environment brings a new revolution in upgrading the quality and efficiency of the product. The server virtualization is the alternative solution to the problem of physical server failure.
From the research and survey, it has been analysed that financial crime enforcement network is capable of providing security system to the financial data which helps in overcoming the problem of financial crime. Bank secrecy act is the facility provided by the financial crime enforcement network. The occurrence of the suspicious activity should be recorded in the financial system.
“The external and internal working helps in enhancing the performance of the organization” (Perkins, 2015). The values can be created for the customers by making use of business secrecy act. Experience and expertise are the pillars for the collaboration of external parties. The operational activities help in achieving the security of the system. The factors which are responsible for upgrading the IT system are categorised as objectivity, excellence, service, integrity, accountability, and community.
“The financial intelligence is the methodologies used for analysing the information related with financial affairs, intension prediction, laws enforcement, costs capabilities, and many more” (Boorman, 2012). The purpose of indulging financial intelligence in the curriculum of the organization is to deal with estimation of the tax, money laundering, and financial transactions. “Collection and analysis of information are the principles used for accommodating financial intelligence in the organization” (Garg, 2016). The outcome of the financial statement depends on influence, circumstances, and facts and findings. “The threats can be detected by analysing the information from the different sources of financial system” (Monstert, 2012).
The national security is the methodology used for creating values for the nation to act against internal and external security issues and threats. The factors which are responsible for indulging new security pattern to enhance the national security are categorised as environmental, military, economic, social, and political. “The national security can get affected by the transmission of resources and information with the third party” (Khan, 2012). The different information should be linked together to overcome the problem of the complexity. The national security uses the fundamentals of macro and micro methodology.
The digital forensic is the methodology used for detecting the factors responsible for the occurrence of crime. “The data analytics is the part of digital forensics which is used for detecting the fraud” (Lu, 2016). The structure and pattern is followed between communication parties for identifying the fraud and crime. The complex and large volume of data is kept in the separate database. The data can be analysed by queries and processes. The structure and pattern should be followed for recognizing the fraudulent behaviour. The effective information should be stored in different database. The reliability can be achieved by utilizing the concept of analytics in the working curriculum of the organization. The pattern of communication should be analysed carefully for identifying and recognizing the occurrence of fraud. The operational activities help in achieving the security of the system. The implementation of data analytics opens a new door of opportunities to bring communication between third parties.
References:
Aung, T. (2013). Software as a service in business (1st ed.). Retrieved from https://repositorio-aberto.up.pt/bitstream/10216/73559/2/32242.pdf
Boorman, J. (2012). Financial system abuse, financial crime, and money laundering (1st ed.). Retrieved from https://www.imf.org/external/np/ml/2001/eng/021201.pdf
Garg, R. (2016). Cloud storage: Advantages, disadvantages, and enterprise solution for business (1st ed.). Retrieved from https://www.researchgate.net/publication/305508410_Cloud_Storage_Advantages_Disadvantages_and_Enterprise_Solutions_for_Business
Hang, H. (2015). Software as a service (1st ed.). Retrieved from https://www.cs.colorado.edu/~kena/classes/5828/s12/presentation-materials/dibieogheneovohanghaojie.pdf
Khan, S. (2012). Cloud based big data analytics- A survey of current research and future direction (1st ed.). Retrieved from https://arxiv.org/ftp/arxiv/papers/1508/1508.04733.pdf
Lu, Y. (2016). 5 reasons to consider SaaS for your business applications (1st ed.). Retrieved from https://www.oracle.com/us/solutions/cloud/saas-business-applications-1945540.pdf
Monstert, D. (2012). Utilization of financial intelligence centre as a crime intelligence source (1st ed.). Retrieved from https://uir.unisa.ac.za/bitstream/handle/10500/9116/dissertation_mosterd_d.pdf?sequence=1
Perkins, S. (2015). Role of financial intelligence (1st ed.). Retrieved from https://pubdocs.worldbank.org/en/834721427730119379/AML-Module-2.pdf
Rumburg, J. (2013). The seven most important performance indicators for the service desk (1st ed.). Retrieved from https://www.thinkhdi.com/~/media/HDICorp/Files/Library-Archive/Rumburg_SevenKPIs.pdf
Sun, Y. (2013). National security decision making: processes and challenges (1st ed.). Retrieved from https://www.brookings.edu/wp-content/uploads/2016/06/chinese-national-security-decisionmaking-sun-paper.pdf
Young, E. (2011). A framework for IT performance management (1st ed.). Retrieved from https://www.cs.uu.nl/research/techreps/repo/CS-2011/2011-006.pdf