Professional Documents
Culture Documents
Y/N
Does the assessment decision need amending?
Y/N
LO2 Compare the tools and technologies associated with business intelligence
LO4 Discuss the impact of business intelligence tools and technologies for
effective decision-making purposes and the legal/regulatory context in which
They are used.
* Please note that grade decisions are provisional. They are only confirmed once internal and external moderation has taken place and
grades decisions have been agreed at the assessment board.
Action Plan
Summative feedback
Assessor Date
signature
Computing
Unit 14: Business
Intelligence Assignment 01
1. A Cover page or title page – You should always attach a title page to your assignment.
Use previous page as your cover sheet and make sure all the details are accurately filled.
2. Attach this brief as the first section of your assignment.
3. All the assignments should be prepared using a word processing software.
4. All the assignments should be printed on A4 sized papers. Use single side printing.
5. Allow 1” for top, bottom , right margins and 1.25” for the left margin of each page.
1. The font size should be 12 point, and should be in the style of Time New Roman.
2. Use 1.5 line spacing. Left justify all paragraphs.
3. Ensure that all the headings are consistent in terms of the font size and font style.
4. Use footer function in the word processor to insert Your Name, Subject, Assignment No,
and Page Number on each page. This is useful if individual sheets become detached for any
reason.
5. Use word processing application spell check and grammar check function to help
editing your assignment.
Important Points:
1. It is strictly prohibited to use textboxes to add texts in the assignments, except for the
compulsory information. eg: Figures, tables of comparison etc. Adding text boxes in the
body except for the before mentioned compulsory information will result in rejection of
your work.
2. Avoid using page borders in your assignment body.
3. Carefully check the hand in date and the instructions given in the assignment.
Late submissions will not be accepted.
4. Ensure that you give yourself enough time to complete the assignment by the due date.
5. Excuses of any nature will not be accepted for failure to hand in the work on time.
6. You must take responsibility for managing your own time effectively.
7. If you are unable to hand in your assignment on time and have valid reasons such as
illness, you may apply (in writing) for an extension.
8. Failure to achieve at least PASS criteria will result in a REFERRAL grade .
9. Non-submission of work without valid reasons will lead to an automatic RE FERRAL. You will
then be asked to complete an alternative assignment.
10. If you use other people’s work or ideas in your assignment, reference them properly using
HARVARD referencing system to avoid plagiarism. You have to provide both in-text
citation and a reference list.
11. If you are proven to be guilty of plagiarism or any academic misconduct, your grade could
be reduced to A REFERRAL or at worst you could be expelled from the course.
I hereby, declare that I know what plagiarism entails, namely to use another’s work and to
present it as my own without attributing the sources in the correct form. I further
understand what it means to copy another’s work.
Submission format
The submission should be in the form of an individual written report. This should be written in a concise, form
Data and information are core to any organizational business process. Meaningful
information is a necessity to drive profitable business actions. The concept of Business
Intelligence (BI) has evolved through technologies such as Decision Support Systems (DSS)
to a number of tools, technologies, architectures and methods which involves data
cleaning, data integration, data mining, data evaluation and data representation. Hence BI
can be identified as a software suite of software and services to transform data into
actionable intelligence and knowledge.
Scenario
Yard of Ale is a large-scale brewery in Sri Lanka and well establish company control 20%
market share of beer market which is the 2nd biggest market share from entire beer
market. The company have automated production line include mills, Brewhouse and
bottling plant and each control by separate embedded software system not allowed to
access operational data stores but can be configured to generate CSV or excel operational
data file at the end of each batch. The company consists of multiple departments
responsible for each operations of the organization such as Production, Engineering,
HR/Legal, finance, Sales and marketing, Procurement, Administration, Quality control,
Research and development, IT and each and every department have its own operational
systems to record keeping purposes and each operational application software developed
by professionally. Each department manages by a department manager. For an example,
production department manages by the production manager and he is responsible for
manage all production related operations in sub departments. Mills, Brew house, Bottling
plant, raw material and finish products stores and each sub department managed by
operational manager. This hierarchical configuration replicates throughout most of the
department. Upper management of brewery required to consolidate all these data in to
one data warehouse with the data contain in the legacy system as well. Other than that
upper management required to incorporate every external data about company and
products from various data collection and research agencies the business intelligent
system. Those external data available as JSON/XML data files, plain text reports, social
media comments/posts and all negative and positive online comments about organization
and products.
Task 1
Analyse the business processes and the supporting processes of the organization
given in the scenario and differentiate between semi structured and unstructured
data. Evaluate the benefits and drawbacks of using application software to handle
the business processes in Yard of Ale.
Task 2
Compare how strategic, tactical and operational decisions are supported within the
organization for business decision making process. You have to furthermore
compare and contrast how various information systems (TPS, MIS, DSS) could be
utilized to enhance those decisions with related to key features of BI framework.
Justify your answer with relevant to the functionalities of business intelligence.
Task 3
Chief Engineer is the tactical manager of engineering department who oversees all
repairs and maintenance of the total eight sectors of the factory that include water
purification plant, Mill, Brewhouse, bottling plant, waste treatment plant, factory
maintenance and repair/ fabrication shop. Each sector consists of two or more sub
sectors and each subsector have 4- 10 of machines. Chief engineer requires to track the
maintenance and repair all the machineries with minimal disruption to production and
he must maintain healthy inventory of spare parts which consist of over 5000s items,
track the progress of every jobs, Identify problematic arias, Track engineers and
mechanics work logs and efficiency and monitor system downtime.
3.1. Explain what business intelligence is and the tools and technologies associated with
it by taking relevant examples to the organization given in the scenario.
Task 4
4.1. Discuss how organizational decision-making process can be improved by
implementing business intelligence tools. Conduct a research to identify the
organizations that have utilized new business intelligent innovations and trends to
improve their performance and to extend BI systems to target audience, provide
better competitive advantage within the market.
4.2. Sharing data within the organization through a BI tool can raise legal, ethical and
professional concerns. Explore the legal issues that may result when using business
intelligence tools (Eg: Data protection laws, Cyber security, etc.) and evaluate how the
chosen organization and extend the target audience / gain a competitive advantage by
securely exploiting Business Intelligence tools.
Yours Truly
Mr. T.Thanushyanthan
Organizations track the successful completion of different steps inside the process —
i.e., benchmarks — or reaching the process's endpoint to gauge the success of a
business process. There are a variety of ways you may take to improve a business
process if it is not assisting an organization in achieving a goal within a schedule or
with the resources available. Businesses may concentrate on business process
visibility in order to spot problems with process performance or execution. Firm
process mapping gives organizations a visual depiction of how different processes
work, giving them a greater understanding of how their business operates. It can also
help improve a company's operational efficiency.[ CITATION sea211 \l 1033 ]
Downloaded by FHiagnunreah2-
2. Processmaker
Processmaker is a low-code business process management (BPM) and workflow
system that allows you to develop, automate, and deploy business processes. It's
suitable for businesses that need enterprise-scale, production-ready business process
management software. It distinguishes itself from competitors by providing a variety
of hosting options, including on-premise, cloud, and open-source.[ CITATION
kis212 \l 1033 ]
3. Zoho Designer
Zoho Creator is a low-code application creation tool that lets users build custom
forms, workflows, and informative pages. It's great for companies searching for do-it-
yourself solutions.[ CITATION kis212 \l 1033 ]
5. Bizagi
Bizagi provides enterprise automation solutions through three products: Bizagi
Modeler, Bizagi Studio, and Bizagi Automation. The Modeler employs Bizagi's own
version of BPMN, which necessitates certain knowledge and training. Bizagi provides
both cloud and on-premise hosting alternatives. Bizagi does not provide prices on
their website and instead requests that you contact them for a quote.[ CITATION
kis212 \l 1033 ]
1.2.3 Evaluate the benefits and drawbacks of using business processes software
in Yard of Ale
All of their methods use internet browsers, and MS Office is employed to scan the
most up-to-date approaches for their documentation functions and internet browsers.
They use LinkedIn and Job Adder during the hiring process. MS Office is used to scan
the most up-to-date methods for their documentation features and internet browsers,
and all of their tactics utilize internet browsers. Kissflow is the software that they
utilize to manage their human resources. Everyone has opportunities, but Sales and
HR departments in particular have a plethora of them. For networking professionals,
LinkedIn was and continues to be the go-to app. Microsoft not only maintains
LinkedIn, but it also develops superb training, office, paper, HR/recruiting, and other
connectors that considerably expand its utility. Despite the fact that it is sometimes
the most significant and first choice for professional interactions, I never used
LinkedIn as a salesperson; the downsides are not well-known in the nonprofit sector.
LinkedIn claims that its services are free, however even their most fundamental
feature, 'people search,' is restricted for free-planning users. The search results are
displayed in the LinkedIn sales navigator, however when we click on a person's
profile, we are routed to a screen that indicates.
Chrome is faster than Firefox and Internet Explorer, and it just takes a few minutes to
get started. The disadvantage is that Chrome uses a lot of memory when running
(RAM). If they accidentally close the window, Chrome will close all open tabs
without warning. The method of auditing is based on online payment. Third-party
apps are simple to integrate, modules and dashboards are simple to use, standard
reports are available, and payroll enhancements are quick. Audit Board is the leading
cloud-based platform for risk automation, collaboration, and reporting in the industry.
With our complete selection of easy-to-use audit and compliance tools, you can
streamline SOX, management controls, and internal audits. Clients of the Audit Board
Task 2
2.1 Strategic, tactical and operational decisions are supported within
the organization for business decision making process
2.1.1 Business Management Level
The term "management levels" refers to the distinction that exists between various
managerial positions within an organization. The number of levels in management
grows in lockstep with the size of the organization and employees, and vice versa.
The various levels of management can influence the chain of command within an
organization, as well as the degree of authority and, in most cases, decision-making
power that all managerial roles have. Managerial levels are often divided into three
categories, each of which directs managers to execute particular tasks. Managers are
members of an organization who are responsible for other members' work
performance. Managers have official authority to make decisions and allocate
resources inside the organization. Most firms have three levels of management: top-
level, middle-level, and first-level.[ CITATION spr21 \l 1033 ]
These three primary levels of management form a hierarchy, with each level having a
different level of importance. In most firms, the number of managers at each level is
structured in a pyramid, with many more first-level managers, fewer middle
managers, and the fewest managers at the top. Each of these management levels is
described below, along with potential job titles, primary responsibilities, and career
paths to these positions. There are also differences in the kind of management
responsibilities that each level of management does and the roles that they play in
Making strategic decisions entails making and developing strategic decisions in order
to attain strategic goals (or goals). The strategic choice is usually made by top level of
management. These are usually long-term decisions or initiatives that will have
ramifications for the next five years or more. Long-term or strategic decisions are
fraught with danger and uncertainty. To gather information for strategic decisions, a
thorough scanning and analysis of the external environment is required.[ CITATION
you21 \l 1033 ]
Strategic level is concerned with decisions that will affect the next five to ten years.
These choices are crucial to the organization's success and improved performance.
These decisions have an impact on the company's competitive position and serve to
position the company's operations plan.[ CITATION you21 \l 1033 ]
Tactical decision-making takes place at the middle management level, and it mostly
concerns resource acquisitions and utilization in order to meet organizational
objectives. When compared to strategic decision-making, tactical judgments cover
shorter time frames and are linked with less uncertainty and thus lesser risk.
Production decision-making at the tactical level is a medium-term decision. (A
planning period of two to three years.) Tactical planning is primarily concerned with
determining how the organization's resources will be used to achieve the
organization's strategic goals. When opposed to strategic planning, tactical decision-
making includes less ambiguity and thus reduced risk. The majority of the data
required for planning is generated internally.[ CITATION you21 \l 1033 ]
Decisions about operational planning are made at the lowest levels of management,
and they are routine decisions. These plans are made to lay out the steps that must be
taken in order to achieve operational objectives. These are for a shorter period of time,
such as a year. These plans have no or very little ambiguity, and the information
required is internal. They are stated quantitatively and can be spelled out in terms of
time and objectives. Lower-level management creates operational plans with a
(maximum) one-year planning horizon. These plans lay out the steps that must be
taken in order to meet operational objectives. These designs are deterministic in the
sense that there is very little uncertainty involved. The plans are defined in actionable
steps that can be measured.[ CITATION you21 \l 1033 ]
As a result, the operational production plan contains all of the information about the
product's processing, from raw materials to finished goods ready for distribution
following quality control and performance testing.[ CITATION you21 \l 1033 ]
Errors can arise during the batch processing delay time. Although transaction
processing failures do occur, they are few and accepted, and do not justify shutting
down the entire system. Data must be readily accessible in a data warehouse, backup
methods must be in place, and a recovery mechanism must be in place to deal with
system failure, human failure, computer viruses, software applications, or natural
disasters.[ CITATION tec217 \l 1033 ]
An Executive Support System (ESS) is software that enables users to swiftly translate
corporate data into executive-level reports, such as those used by billing, accounting,
and staffing departments. Executives can make better decisions with the help of an
ESS. Executive Information System is another name for ESS (EIS). An ESS provides
analysis utilities and performance assessment predictions in addition to facilitating
access to organized business and departmental data. An ESS gives potential outcomes
as well as rapid statistical data for use in decision-making. ESS reporting tools and
results are ultimately dependent on the developer and industry application. Cambridge
Systematics, Inc., for example, developed an ESS that is connected with the Ministry
of Transportation of Canada's investment plan.[ CITATION tec218 \l 1033 ]
In fact, many (if not all) firms focus on aligning MIS with business goals in order to
gain a competitive advantage over their competitors. MIS specialists design data
management information systems (i.e., storing, searching, and analyzing data). They
also manage a variety of information systems to fulfill the demands of managers,
employees, and customers. MIS experts can play a major role in areas like
information security, integration, and exchange by collaborating with other members
of their work group, as well as with their customers and clients. As a business
information system major, you'll learn to build, implement, and use business
information systems in novel ways to improve your company's performance and
efficiency.[ CITATION may21 \l 1033 ]
MIS Middle level of The MIS system analyzes the inputs • Make a tactical strategy
management using standard algorithms. Data is plan.
acquired, compared, and summarized • Make a decision about the
in reports prepared by tactical company's strategic plans.
managers, for example, to monitor,
regulate, and anticipate future
performance.
Task 3
3.1. Explain what business intelligence is and the tools and
technologies associated with it by taking relevant examples to the
organization given in the scenario.
Figure 9-SAP
2. Datapine:
Datapine is an all-in-one business intelligence platform that makes even non-technical
individuals comfortable with the difficult process of data analytics. Data analysts and
business users may quickly combine different data sources, execute complex data
analysis, develop interactive business dashboards, and generate actionable business
Figure 10-Datapine
3. MicroStrategy:
MicroStrategy is a business intelligence platform for enterprises that provides strong
(and fast) dashboarding and data analytics, as well as cloud solutions and
hyperintelligence. Users can use this solution to spot patterns, spot new opportunities,
boost productivity, and more. Users can connect to one or more sources, whether the
data is coming from a spreadsheet, the cloud, or enterprise data tools. It can be
accessed from a computer or a mobile device. Setup, on the other hand, can
necessitate the participation of several parties and a thorough understanding of the
application in order to get started.[ CITATION mop21 \l 1033 ]
F igure 11-MicroStrategy
4. SAS Business Intelligence :
While SAS is most known for its superior predictive analytics, the company also has a
strong business intelligence platform. This well-established self-service platform,
which dates back to the 1970s, helps users to make educated business decisions by
leveraging data and metrics. SAS provides users with a variety of customization
Figure 13-Power BI
Packs are now being used in a growing number of programs, including QuickBooks.
It's one of the most useful features of Power BI. Use Microsoft AI's most recent
developments to help non-data scientists prepare data, build machine-learning models,
and quickly find insights from both structured and unstructured data, such as text and
images. Power BI dashboards provide a unique printing option that could be useful in
board meetings and arguments. With new data sources being added every month,
Power BI Desktop has a huge number of structured and unstructured on-premises and
cloud data sources. The powerful DAX formula language provides libraries with
incredible possibilities for doing data acrobatics and constructing advanced analytical
data models.
You can speed up big data planning with Azure. Reduce the time and effort required
to process and exchange massive amounts of data. By accessing an Azure data lake
with no limits, they will reduce the time it takes to gather insights and boost
collaboration among business analysts, data engineers, and data scientists. Tableau
wins in terms of speed and capability, while Power BI wins in terms of ease of use.
Tableau and other programs, on the other hand, will assist medium- and enterprise-
sized firms that value data.
Figure 20-Promotion
5. Improve communication:
The BI tool makes it easier to share confidential information with Yard of Ale
Company and stay in touch. Even if a user's device is stolen or misplaced, BI
solutions keep vital corporate information safe and secure. These systems frequently
allow users to access data at any time and from any location, allowing each user to be
aware of the current status of the beer at all times. This can help accelerate the growth
of Yard of Ale company operations by increasing Yard of Ale Company,
1. Technology Shifts:
BI platforms in the early 2000s built solutions based on the architecture that was
prevalent at the time. More users meant larger data, thus high-performance desktop
computers with single-processor server systems with more memory and directly
attached storage were purchased. The design point for the previous two generations
was a data-centric stack, whereas the third generation is going toward a network-
centric stack. Critical technology shifts began to emerge as mega-vendors like IBM
and Oracle were busy merging. BI solutions used to be largely deployed on the
desktop, and business software products were difficult to deploy internationally.
However, as the web became the focal point of design, a fully web-based architecture
was created, with a simple installation process and speedier deployment possibilities.[
CITATION ana211 \l 1033 ]
3. Data Storytelling:
Earlier BI solutions relied on tools that were just focused on reporting and
dashboards. However, as architectures changed, so did the functionality of BI
solutions. A skilled person can argue that a certain set of facts has provided self-
evident insights. However, your audience must be able to comprehend your thoughts
in the same way. Using analytical thinking, telling tales through data can help
overcome that divide. A dashboard will only provide users with graphical insights or
data that they may not completely comprehend. To understand the true significance of
the data, solutions were developed that included narrative tools.[ CITATION ana211 \
l 1033 ]
Companies are no longer debating if data visualizations improve analysis, but rather
how to best communicate each data story, especially with the support of
contemporary BI dashboard tools. Data security and data discovery will be the focus
in 2022, with clean and secure data mixed with a clear and compelling presentation. It
will also be a year of collaborative business intelligence and AI. We're looking
forward to seeing what this new year has in store for us.[ CITATION dat21 \l 1033 ]
1. Artificial intelligence
We'll begin by looking at what's new in business intelligence using AI. Gartner's
current Strategic Technology Trends study focuses on this trend, which combines AI
with engineering and hyper automation, and focuses on the level of security in which
AI risks establishing weak areas of attack. Artificial intelligence (AI) is a branch of
research that aims to make machines do things that complicated human intelligence
would normally do. Despite the legitimate warnings of certain reputable scientists and
tech-entrepreneurs, AI is not yet on the verge of destroying the human race.
[ CITATION dat21 \l 1033 ]
This notion is referred to as ethical AI, and it tries to ensure that businesses use AI
systems in a legal manner. As it learns from historical trends and patterns, solutions
like an AI algorithm based on the most advanced neural networks give great accuracy
in anomaly detection.[ CITATION dat21 \l 1033 ]
Figure 30-AI
Artificial intelligence capabilities have begun to emerge that allow users to speak with
software in plain language: the user inputs a question or request, and the AI delivers
the best possible response. The demand for real-time online data analysis tools is
growing, and the Internet of Things (IoT) is providing an inexhaustible amount of
data, putting statistical analysis and management at the top of the priority list. Testing
AI in a duel is another growing trend in the future of business intelligence. When a
fight occurs multiple times, AI can learn to analyze and break that type of online
security mechanism. In 2022, we should keep a watch on how tech giants use AI in a
variety of methods that will change the machine learning process.[ CITATION
dat21 \l 1033 ]
2. Data Security
In 2021, data and information security were on everyone's minds, and they will
continue to do so in 2022. Privacy rules such as the GDPR (General Data Protection
Regulation) in the European Union, the CCPA (California Consumer Privacy Act) in
With a more modular approach, it aims to create a defined security perimeter around a
person or a specific site, allowing users to securely access data from their
3. Data Discovery/Visualization
In the recent year, data discovery has become more important. Data discovery was
ranked as one of the top four business intelligence trends for 2022 in a poll performed
by the Business Application Research Center. Essentially, data discovery is the
process of gathering data from a variety of internal and external sources and
combining it with advanced analytics and visualizations. Modern business intelligence
technologies provide data integration, interactive visualizations, a user-friendly
interface, and the flexibility to work with large amounts of data in an efficient and
straightforward manner to businesses of all sizes. The Research Center underlines that
“the increasing demand for data discovery tools represents a tremendous shift in the
BI sector toward higher data consumption and the extraction of insights”.[
CITATION dat21 \l 1033 ]
• Easy to operate
• Adaptive and nimble
• Reduces the time it takes to get an idea
• Accepts a large volume and variety of data with ease.
Essentially, data quality management guarantees that businesses can make the best
data-driven decisions possible by ensuring that they are using the correct data for their
analysis. Data must be accurate, consistent, comprehensive, timely, and compliant, to
name a few standards to follow in order to achieve a successful data management
process. That is, there should be no duplicate or missing values, no obsolete data that
does not represent the relevant chronology, and no inconsistent data.[ CITATION
dat21 \l 1033 ]
Predictive analytics provides a reasonable estimate of what will happen in the future,
as well as a few alternative scenarios and risk assessment. Predictive analytics is a
business tool that analyzes current data and past facts to better understand customers,
goods, and partners, as well as identify possible dangers and possibilities. Marketers
ARIMA is a time series analysis model that uses historical data to model current data
and make predictions about the future. Inspection of autocorrelations – evaluating
how present data values depend on historical values – is part of the study, as is
determining how many steps into the past should be considered when making
predictions. The moving average (MA) portion uses any discrepancy between
projected and actual data. Any discrepancies in these points can provide insight into
the behavior of the data series, anticipate new abnormalities, or aid in the discovery of
underlying patterns that are not evident to the naked eye. Users just choose historical
data points, and the software generates forecasts based on history and present data, as
seen in the following example:[ CITATION dat21 \l 1033 ]
With additional variables in the mix, forecasting and alarms will eventually become
much more important in formulating correct corporate responses and strategies for
future initiatives. Furthermore, integrating live dashboards will enable businesses to
quickly obtain pertinent information about their operations and respond if any
possible difficulties occur. Data that is up to date is more vital than ever before, and
because the world has evolved, businesses must adapt as well. High-tech data access
is becoming the norm, and it's one of the reasons why certain businesses will thrive
while others will perish. Real-time data will undoubtedly be one of the key drivers of
business analytics trends in 2022, and we will undoubtedly see more of it in action.
[ CITATION dat21 \l 1033 ]
All of these options are available on all devices, which improves decision-making and
problem-solving processes, which are crucial in today's constantly changing world.
This is especially important now that the epidemic has driven businesses to migrate to
a home office environment, where communication is more important than ever. The
focus of contemporary BI systems is on collaborative information, information
improvement, and collaborative decision-making. However, collaborative BI is not
limited to document exchanges or updates. It must keep track of meetings, phone
conversations, e-mail exchanges, and the gathering of ideas. According to more recent
research, collaborative business intelligence will become more integrated to more
systems and people. In this new concept, the team's performance will be affected, and
the decision-making process will flourish.[ CITATION dat21 \l 1033 ]
Data literacy is the core of a successful data-driven culture, despite the rise of self-
service tools that are accessible to everyone. Business leaders are responsible for
providing all employees with the necessary training and tools to enable them to work
with data and analytics. A rigorous assessment of the skills of employees and
managers is required to identify weak spots and gaps in order to establish a successful
data literacy approach. Start by identifying fluent data users who can act as
"mediators" for less-skilled groups, as well as communication hurdles where data is
failing to fulfill its purpose, according to Gartner. Creating focused training instances
will be easy now that you have all of this information.[ CITATION dat21 \l 1033 ]
Users of various levels of knowledge will be able to undertake advanced analysis and
utilize data as their primary language in the long term, given the right training and
tools. Data science will no longer be required of experts as tools like as predictive
analytics become more widely available, allowing these professionals to focus on
more complex jobs such as Machine Learning or MLOps. Indeed, Gartner predicts
that by 2025, the scarcity of data scientists will no longer be a barrier to firms
adopting modern technology procedures. Data literacy, on the other hand, will be a
hot subject in the BI business in the coming year.
9. Data Automation
Without data (analysis) automation, business intelligence themes would be
incomplete. We've seen so much data produced, saved, and available to handle in the
In our post about the top 10 IT buzzwords that Gartner expects will explode in the
next year, we cited hyper automation, and we agree. This new trend refers to firms
automating as many operations as possible utilizing a variety of tools and
technologies, including artificial intelligence (AI), machine learning, low-code, and
no-code solutions, among others. Many automation opportunities have arisen as a
result of business analytics, and we will see even more in 2022. Long-standing
boundaries between data scientists and business users are gradually being dissolved,
resulting in a one-stop shop for whatever data demand a firm may have, including
data collection, analysis, monitoring, reporting, and sharing. Intelligent reporting -
predictive analytics and automated reports boost the ability of business users to
automate data on their own, without the assistance of the IT department, in one
scenario. Data scientists, on the other hand, will continue to manage complicated
analyses that require human scripting and coding.[ CITATION dat21 \l 1033 ]
4.2. Sharing data within the organization through a BI tool can raise
legal, ethical and professional concerns. Explore the legal issues that
may result when using business intelligence tools (Eg: Data
protection laws, Cyber security, etc.) and evaluate how the chosen
organization and extend the target audience / gain a competitive
advantage by securely exploiting Business Intelligence tools.
4.2.2 Legal or Security issues that may result when using business intelligence
tools
There are various types of attacks that can occur. The attacks are carried out because
of the IoT platform's security and privacy issues. Hackers, intruders, and unauthorized
agents can all carry out attacks. Physical cyber-attacks, network cyber-attacks,
software attacks, and encryption attacks are all sorts of attacks, according to Larson &
Chang (2016). The main reason for the physical attack, according to the author of the
paper, is due to the sensors inherent in IoT devices. In the context of a physical attack,
the author goes on to say that in this form of attack, the hacker typically tries to gain
access to a user's machine that is placed in close proximity. According to the author,
tampering will aid hackers or intruders in extracting data loaded with malicious code.[
CITATION res21 \l 1033 ]
The author also mentions cyber-attacks on the network system in the paper. In a
network cyber-attack, as stated by the author, hackers or intruders attempt to get
access to the user's network in order to detect and verify what data is traveling over it.
A man-in-the-middle assault is the most common type of network cyber-attack. Apart
from network cyber-attacks, the author has described another type of attack: software
attacks. In the context of a software attack, the author has stated that dangerous files
In the case of an encryption assault, intruders or hackers infer the encryption key in
order to create their own code and algorithm for decrypting the key. According to the
author, once the hacker has unlocked the key, they will insert their own code into the
user system in order to monitor it. According to the author, the form of attack can be
DDoS (Distributed Denial of Service), Bonnets, Man in the Middle attacks, and so on,
depending on the type of assault.[ CITATION res21 \l 1033 ]
1. Botnet Attacks
According to them, a botnet is a network of one or more devices connected together.
According to the author, Botnet attacks are typically carried out with the purpose of
disrupting routine operations or degrading the overall services of the target system.
Before starting the attack, a large number of Botnets are necessary for its formation.
The botnet6s are delivered to the network once the assault has been launched in order
to target the system on a big scale. The request for an IoT assault for business
intelligence is sent in the form of text messages or emails. These types of attacks can
have a negative influence on business intelligence by slowing down network servers,
making the network too busy for users to access, and temporarily freezing the server.
[ CITATION res21 \l 1033 ]
In the case of account takeover identity theft, hackers or attackers modify the personal
details of the user's current account in order to gain access to information connected
to the organization's business data analytics.[ CITATION res21 \l 1033 ]
3. Denial of service
(DoS)
They claim that a denial of service assault is another source of concern in the Internet
of Things platform's business intelligence. Denial of service occurs when a service is
unavailable throughout the normal work process, according to the author of the
article. As the author of the article points out, service unavailability can occur for a
variety of reasons. In the framework of a distributed denial of service assault, the
author has shown how a large number of computer systems utilized for business
intelligence in the organization could be harmed by introducing dangerous files or
malware into the system.[ CITATION res21 \l 1033 ]
All users are expected to use corporate sites, services, facilities, and equipment in a
lawful way at all times, according to IT Services. We are still subject to the same rules
and regulations that apply in the real world when we utilize technology. Individual
• The Act on Copyright, Designs, and Patents (Act on Copyright, Designs, and
Patents) (1988)
Users are not permitted to keep or handle personal data on the organization's IT
infrastructure unless they adhere to current data privacy standards. Any liability
arising from non-compliance with the rules of current data protection legislation, as
well as any constraints put on how the data can be retained or used, falls on the
consumer. You must observe all relevant local laws while acquiring services from
other jurisdictions, including those controlling the service's location. When using IT
services, you are bound by the organization's general rules. You must abide by the
same regulations that govern any other entity whose services you use. This IT rule
will be considered a violation if any current third-party legislation or regulation is
broken.
Personal data protection legislation differs greatly from area to region, and even
nation to country. Some places, such as Europe, have implemented strict restrictions
that inflict harsh penalties on those who breach the rules, while others, such as the
United States, are still grappling with formal and centralized laws that provide
consistent protection. GDPR's implementation resulted in a seismic upheaval in how
Here are some of the most important areas and nations that now have international
data privacy laws:
• Europe – The GDRP regulation was more of an international privacy law for data
protection than a localized layer of security and compliance that touched any
organization that processed any personal data from any EU citizen. With the
worldwide enforcement of security and data protection measures, the future of data
protection is defined by stronger regulations, larger penalties, and more reputational
harm if compliance is disregarded. After some corporations disobeyed the GDPR and
were slapped with large fines, businesses sat up and took notice. Organizations are
experiencing a difficult time as a result of the GDPR's implementation and the heavy
penalties and reputational harm that came with it. They must be compliant, and they
will require the appropriate assistance to do so.[ CITATION tha21 \l 1033 ]
• The United States of America - while the country lacks explicit regulations at the
federal level, there is some federal legislation that protects data in general. Several US
states have enacted their own data-related legislation as a result of the devolution of
authority to the states. The California Consumer Privacy Act (CCPA), which provides
extensive privacy rights and consumer protection, is regarded one of the most
forward-thinking pieces of legislation in the country. The legislation gives people of
the state the ability to control how and why their personal information is gathered and
utilized. Alabama, Connecticut, Florida, New York, Washington, Illinois, Texas, and
Virginia are among the states that have legislation in place or are in the process of
being approved. Here is a complete collection of US privacy laws and their current
status.[ CITATION tha21 \l 1033 ]
• The Personal Information Protection and Electronic Documents Act (PIPEDA) was
enacted in Canada, and it is linked with EU data protection legislation. The Act
adheres to the five global privacy standards and provides customers with strong
personal information protection. On November 17, 2020, the Canadian Minister of
Information, Science, and Economic Development unveiled the Digital Charter
Implementation Act (DCIA). If passed, it will replace PIPEDA and bring some
• The GDPR will apply in the United Kingdom until July 31, 2021, after which, due to
Brexit, alternative legislation will apply. However, as of January 1, 2021, the Data
Protection Act 2018 has already incorporated the EU's GDPR rules into UK law. The
Data Protection, Privacy, and Electronic Communications (DPPEC) Regulations of
2019 replaced the Data Protection Act of 2018 with the GDPR to establish a
comprehensive, UK-specific data protection framework known as the UK GDPR.
[ CITATION tha21 \l 1033 ]
• India has approved the Personal Data Protection Bill, which incorporates many of
the GDPR's concepts into the country's legal framework. These include notice and
prior consent requirements for the use of individual data, constraints on the reasons
for which organizations can handle data, and restrictions to guarantee that only data
required for delivering a service to the individual in question is gathered. However, in
2017, a supreme court judge decided that private corporations using Aadhaar data - a
platform that was launched in 2009 and is an important aspect of the country's
biometric identification program – was unlawful. Aadhaar has become a single,
universal digital identity number that every registered institution may use to
authenticate an Indian citizen since each person has their own 12-digit number. The
Aadhar number may now be used for verification, but it forbids private firms from
gathering personal information about the user.[ CITATION tha21 \l 1033 ]
In terms of how personal data is acquired, used, and secured, these guidelines
dramatically increase the employer's obligations and responsibilities. Employees must
be aware of their obligations under data protection laws, and firms must have
adequate data protection policies and procedures in place. Businesses must educate
their staff about the GDPR and provide training on the new regulations. A list of some
of the most essential requirements for employers, as well as a review of employee
rights, is provided below.[ CITATION gdp21 \l 1033 ]
• Consent: If none of the other legal grounds described above apply, consent is
an appropriate justification for the processing of employee data. Permission
must be "freely provided, precise, informed, and unequivocal," according to
the GDPR. This implies that the data subject must be notified that they are
agreeing to the processing of their data and should not be coerced to do so.
Before an employee consents to their data being processed, the employer must
Problems Law
Theft of personal information The Data Protection Act (DPA)
Copyright law
Computer Security Act of 1987
Unauthorized access to a PC and a business The Computer Fraud and Abuse Act
intelligence application (CFAA) Computer Security Act of 1987
Intentionally causes a program, information, The Computer Fraud and Abuse Act (CFAA)
code, or instruction to be sent.
Nestle suffers harm and losses as a result of The Computer Fraud and Abuse Act (CFAA)
unintentional access.
Intentionally and knowingly defrauding The Computer Fraud and Abuse Act
traffics (as defined in section 1029) in any bi (CFAA) The Data Protection Act (DPA)
application password Computer Security Act of 1987
Threatening to harm a machine that isn't The Computer Fraud and Abuse Act (CFAA)
protected
Threat of obtaining information from a The Computer Fraud and Abuse Act (CFAA)
secured computer without permission
Without authorization, information was The Computer Fraud and Abuse Act
accessed from a Nestle secured (CFAA) The Data Protection Act (DPA)
computer. Computer Security Act of 1987
4.2.4 Evaluate how the chosen organization and extend the target audience / gain
a competitive advantage by securely exploiting Business Intelligence tools.
Conclusion
The Yard of Ale beer company is one of Sri Lanka's largest corporations active in the
beer industry. The most essential business process at Yard of Ale is beer production,
but the company also features a variety of other excellent business processes,
including finance and accounting, human resource management, marketing, logistics,
and auditing. The company's board of directors is divided into three layers, with
representatives from each layer making decisions based on their level of knowledge.
The Yard of Ale beer company is one of Sri Lanka's largest corporations active in the
beer industry. The most essential business process at Yard of Ale is beer production,
but the company also features a variety of other excellent business processes,
including finance and accounting, human resource management, marketing, logistics,
Self -Criticism
During this time, I had to put in a lot of effort to finish my assignments before the
deadline. I was worried about whether or not I would be able to deliver my
assignment on time. As I was working on my assignment, I wanted to keep the
consistency in mind. As a result, I had to revise the contents of the task and the page
templates multiple times. Well, I gave it my all to finish this assignment before the
deadline. This assignment revealed some of my strengths and weaknesses to me.
When I started doing this Assignment I have half knowledge of how to do this
assignment. And I poorly know about the system. Laziness, tired and lack of interest.
Gantt-chart
References
searchcio. 2021. business process. [ONLINE] Available at:
https://searchcio.techtarget.com/definition/business-process. [Accessed 1 December
2021].
kissflow. 2021. The Extensive Guide to Business Processes. [ONLINE] Available at:
https://kissflow.com/workflow/bpm/business-process/. [Accessed 1 December 2021].
proceso. 2021. Pros and Cons of Business Process Management (BPM). [ONLINE]
Available at: https://proceso.pro/en/blog/pros-and-cons-of-business-process-
management-bpm/. [Accessed 3 December 2021].
mopinion. 2021. Top 15 Business Intelligence Tools in 2021. [ONLINE] Available at:
https://mopinion.com/business-intelligence-bi-tools-overview/. [Accessed 4
December 2021].
datapine. 2021. Top 10 Analytics And Business Intelligence Trends For 2022.
[ONLINE] Available at: https://www.datapine.com/blog/business-intelligence-trends/.
[Accessed 9 December 2021].
researchgate. 2021. Security and Privacy Issues for Business Intelligence in lOT.
[online] Available at:
thalesgroup. 2021. Data protection around the world. [ONLINE] Available at:
https://www.thalesgroup.com/en/markets/digital-identity-and-
security/government/magazine/beyond-gdpr-data-protection-around-world. [Accessed
20 October 2021].