Key Information System Terminology
Data Analytics
- Data analytics involves transforming raw data into useful information to uncover patterns, correlations, trends and insights
- Data analytics has become increasingly important to businesses in today's data-driven world
- It helps organisations to gain a competitive advantage and make informed decisions
- Data-driven decision making tends to be less risky than pursuing hunches
- It helps organisations to gain a competitive advantage and make informed decisions
Diagram Illustrating Key Components of Data Analytics
Data Analytics involves the collection, cleaning & preparation, analysis, visualisation and interpretation of data before communicating to stakeholders
Types of Data Analytics
Descriptive | Diagnostic |
|
|
Predictive | Prescriptive |
|
|
Databases
- A database provides a structure for stored data
- Typically electronic databases allow for swift data input, storage, protection and retrieval of information
- Setting up and maintaining databases can be costly
- Data must be kept secure
- Database managers may be required to ensure databases are fit for purpose
Diagram: Database Use in a University
Universities use database systems for many reasons, including student and employee information systems, library management and attendance tracking
Cybersecurity & Cybercrime
- Cybersecurity includes systems used to protect computer networks from theft or unauthorised access of data
- Cybercrime is illegal activity related to the use of computer or network devices
- It is often related to financial or commercial gain
- It is a significant risk to business - according the UK government cybercrime cost British businesses an average of £1,100, with 69% of large businesses reporting a significant cyber-attack in 2022
Common Forms of Cybercrime
Form |
Description |
Phishing |
|
Ransomware/Malware attacks |
|
Identity theft |
|
Email/internet fraud |
|
Intellectual property theft |
|
Account hijacks |
|
- A business can protect itself against cybercrime in a number of ways
Ways to Protect Business Systems from Cybercrime
Method |
Explanation |
Employee training and awareness |
|
Regular security audits & access control |
|
Strong password & encryption policies |
|
Backup and recovery |
|
Exam Tip
Despite taking all possible steps to protect their IT systems, businesses that increasingly rely on technology to manage key business processes are at risk from cybercrime
Business continuity following disruptions to IT systems is an important part of contingency planning and must be updated regularly to be effective against the latest risks