You are on page 1of 2

Enterprise performance management (EPM) (also known as corporate performance management or business performance

management) is enterprise software that helps organizations link their strategies to their plans and execution. EPM is associated with
● Business intelligence and enterprise resource planning (ERP is a subset of EPM and is covered in Study Unit 10, Subunit 2.)

● Budgeting and forecasting

● Financial reporting
● Analyzing performance results and identifying ways to improve
● Modeling and predictive analytics

19.2 Data Governance and the Data Life Cycle


Organizations need to be aware of the unique risks associated with a computer-based business information system. IT security
(or cybersecurity) is information security applied to computer hardware, software, and computer networks. Safe computing can
be achieved by using carefully crafted policies and procedures in conjunction with antivirus and access control software.

The most comprehensive indicator of an information system’s compliance with prescribed procedures is the control the system has
over the data. This includes the capacity and complexity of the system, as well as the accessibility of the data to the end-user.

System Availability
The ability to make use of any computer-based system is dependent on

● An uninterrupted flow of electricity


● Protection of computer hardware from environmental hazards (e.g., fire and water) ● Protection of software
and data files from unauthorized alteration
● Preservation of functioning communications channels between devices

Risks to Data
Volatile Transaction Trails
In any computer-based environment, a complete trail useful for audit purposes might exist for only a short time or in only
computer-readable form. In online and real-time systems, data are entered directly into the computer, eliminating portions of the
audit trail traditionally provided by source documents.

Decreased Human Involvement


Because employees who enter transactions may never see the final results, the potential for detecting errors is reduced. Also, output
from a computer system often carries a mystique of infallibility, reducing the incentive of system users to closely examine reports and
transaction logs.

You might also like