Question: Business Intelligence and Reporting for Enterprises COURSEWORK ASSIGNMENT 1 - Report ( First Diet ) Coursework Aim To enable students to critically review Enterprise Information

Business Intelligence and Reporting for Enterprises
COURSEWORK ASSIGNMENT 1- Report (First Diet)
Coursework Aim
To enable students to critically review Enterprise Information Systems, to assess business process management approaches and to evaluate legislation on data privacy and ethics for a specific business scenario.
2. Assessment learning outcomes
The following module learning outcomes are assessed in this coursework assignment:
LO1 Critically assess and explain the major objectives, success factors and significant elements of Enterprise Information Systems.
LO2 Explain and assess approaches to business process management analysis and design.
LO5 Evaluate and critique current legislation on data privacy and relevant ethical issues.
3. Coursework Assignment
This coursework assignment is an individual report. Copying from any source and collusion between two or more students are serious offences and will be dealt with through Academic Conduct procedures. Reference all sources using the guide in Moodle. Details of the marking scheme are detailed below, use this as a guide to the content you will include when preparing your report.
4. Report Case-study
Your report is to be based on the following adapted business scenario.
a. Background
Amidst the excitement surrounding the integration of ERP systems, data mining, and BPM, it's crucial to address the concerns regarding data privacy and ethical considerations. As the government harnesses the power of enhanced data to inform its decision-making processes, ensuring the protection of sensitive information and upholding ethical standards must remain paramount.
First and foremost, the government must adhere to stringent data privacy regulations to safeguard the confidentiality and integrity of citizen information. With access to vast repositories of data, there's a heightened risk of unauthorized access or data breaches, potentially compromising individuals' privacy rights. Implementing robust encryption protocols, access controls, and regular audits can fortify the government's defence against cyber threats and unauthorised data access.
CSI11100/800/200 Coursework 1
Page 3 of 6
 Business Intelligence and Reporting for Enterprises COURSEWORK ASSIGNMENT 1- Report (First

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!