ITM 590 Module 2 Thread Discussion question , ” Data governance is a key concern for organizations both in terms of security, but also in terms of high integrity to fuel work based on data analytics. It is extremely important to know the strength and limits of database management systems and their governance policies. Organizational investments in databases of even modest scope can easily go up to seven figures; it is crucial to understand information provided by product or service vendors to make informed decisions. Describe how you will evaluate data governance policies to select the best data infrastructure to power the organization’s data analytics for business decision making. ”

ITM 590 Module 3 Thread Discussion question, ” Given the rise of mobile and hand-held devices, with many employees wanting to bring their own devices to work and attach to the company network, discuss how the handling of these devices will be integrated into your IT Governance Plan.”

ITM 590 Module 4 Thread Discussion Question, ” Discuss the strategic focus that the IT Governance plan for the technology infrastructure for your Capstone corporation has enabled for your business. In other words, how will this IT Governance plan enable strategic advantage for the firm.
Class: ITM590 Case Assignment (Capstone Course)
Instructor:
Date:

ITM 590 Module 2 Thread Discussion question
Successful data governance infrastructure is dependent on many factors key among them being that it should be backed by a careful planning process, putting the right technology and people in place as well as establishing the right models for data analytics in order to improve the decision-making process (Sil & Das, 2016). Having these measures in place can enhances the automation of process and promotes efficiency throughout the organization. This Assessment looks at how this project will select the best data governance policies in order to come up with the best data infrastructure to power the organization forward.
The first step will be to ensure that the right data is chosen. With the field of data modeling changing significantly recently, establishing better and bigger data analytics ensures that an organization can have a better view of its current business environment. The fact that organization can now be able to see what previously was impossible to envision ensures that it can put in place better strategies while consumer experience improves significantly. For this reason, it would be appropriate to begin with building models that can predict also optimize the organization’s business outcomes. According to Kumar, Pradhan and Ramanathan (2017), studies show that hypothesis-led modeling tends to generate better outcomes that can be easily understood by the organization’s management especially during the decision making process.
Studies suggest that challenges with modern IT governances infrastructure often occurs when an organizations existing culture fails to match with the emerging tactics being used to execute data analytics (Peterson, 2014). In other words, the new approaches either fail to align with the methodology an organization uses to make its decisions or don’t give a clear plan on how these decisions can be achieved. For this reasons, thoughtful organization change will be required when implementing this IT governance infrastructure so as to ensure that the establish data analytics tools match with the existing and evolving dynamics within the market.

References
Peterson, R. R. (2014). Integration Strategies and Tactics for Information Technology Governance. Strategies for Information Technology Governance, 37–80. doi: 10.4018/978-1-59140-140-7.ch002
Kumar, U. D., Pradhan, M., & Ramanathan, R. (2017). Basics of Analytics and Big Data. Big Data Analytics Using Multiple Criteria Decision-Making Models, 67–86. doi: 10.1201/9781315152653-3
Sil, J., & Das, A. K. (2016). Feature Selection for Adaptive Decision Making in Big Data Analytics. Data Science and Big Data Computing, 269–292. doi: 10.1007/978-3-319-31861-5_12

ITM 590 Module 3 Thread Discussion question
Today mobile technology has been of significance importance to most organizations as their employees can now be able to execute various tasks even when they are in transit thanks to mobile technology. As a consequence, organizations have been able to improve on their response time and customer experiences as communication becomes more efficient. However, even with these great changes, it has come with numerous challenges as organizations are now exposed to new risks that come with mobile technology as attackers take advantage of any existing weaknesses on the side of the technology, employees or organization in general (Venugopal & Hu, 2008). For this reasons, there is need to have an elaborate plan on how these mobile devices will be integrated into this information technology governance plan.
To understand the current mobile security framework, there will need to have a compressive security assessment that covers the originations current business environment. Having such a plan in place will help the organizations to identify any incidences of potential early enough before they can occur. In addition,(Venugopal and Hu (2008) adds that an effective policy on mobile security should also be put in place at the organization with the policy being used to determine the applications that will be used to protect these mobile devices and on which types of devices and mobile users they will be applied to. For example, it may be applied on emails, field services applications, among others. If properly managed, this process will ensure that the overall security framework of the mobile devices used at the organization is enhanced (Venugopal & Hu, 2008). This will result in driving the overall revenue growth and productivity of the organization forward.
Finally employee awareness and responsibility on the existing mobile devices risks should also be enhanced through regular awareness campaigns and trainings at the organization. By establishing these measures, Jang and Kim (2016) argues that it means that the organization has put its employees at the center of an effective IT governance security effort, a strategy that has been known to work very well since these employees become critical security defense layers of the organization’s risk mitigation strategy.

References
Jang, S.-W., & Kim, G.-Y. (2016). Learning-Based Detection of Harmful Data in Mobile Devices. Mobile Information Systems, 2016, 1–8. doi: 10.1155/2016/3919134
Venugopal, D., & Hu, G. (2008). Efficient Signature Based Malware Detection on Mobile Devices. Mobile Information Systems, 4(1), 33–49. doi: 10.1155/2008/712353

ITM 590 Module 4 Thread Discussion question
The IT governance plan has given the organization a strategic focus for allowing the business to reach its desired outcomes. This IT governance plan has offered the organization a formula for reach its goal easily through the implementation of some basic elements such as; Responsiveness and alignment of operations at the organization improve significantly as the management is able to improve on its responsiveness to future information technology governance challenges. In addition, it allows the organization’s leadership to be actively involved in the control and management of IT activities (Emarld, 2017). As such, having these measures in place is crucial because the organization’s management will benefit from the strategic focus brought about by the IT governance plan.
Another key benefit of this IT governance plan is that it will Help the organizations management with its resource balancing objectives (Emarld, 2017). As a result, the organization is able to have adequate information technology support necessary too undertake future investment in enhancing its IT investments. Moreover, the IT governance plan enhances the accountability of operations in the sense that all responsibilities are clearly outlined.
With modern organizations now exposed to new risks that come with mobile technology as attackers take advantage of any existing weaknesses on the side of the technology, employees or organization in general, the IT governance plan provides a compressive security assessment that covers the originations current business environment (Jang, & Kim, 2016). This has ensured that the overall security framework of the mobile devices used at the organization is enhanced. Jang and Kim (2016) also add that the IT governance plan has also ensured that an effective policy on mobile security is put in place at the organization with the policy being used to determine the applications that will be used to protect these mobile devices and on which types of devices and mobile users they will be applied to. In return these efforts have driven the overall revenue growth and productivity of the organization forward.

References
Emarld. (2017). How strategic governance boosts success in IT outsourcing. Strategic Direction, 33(10), 20–22. doi: 10.1108/sd-07-2017-0118
Jang, S.-W., & Kim, G.-Y. (2016). Learning-Based Detection of Harmful Data in Mobile Devices. Mobile Information Systems, 2016, 1–8. doi: 10.1155/2016/3919134

Published by
Essays
View all posts