ebook img

Creating Smart Enterprises: Leveraging Cloud, Big Data, Web, Social Media, Mobile and IoT Technologies PDF

409 Pages·2018·4.35 MB·English
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview Creating Smart Enterprises: Leveraging Cloud, Big Data, Web, Social Media, Mobile and IoT Technologies

Creating Smart Enterprises Leveraging Cloud, Big Data, Web, Social Media, Mobile and IoT Technologies Creating Smart Enterprises Leveraging Cloud, Big Data, Web, Social Media, Mobile and IoT Technologies By Vivek Kale CRC Press Taylor & Francis Group 6000 Broken Sound Parkway NW, Suite 300 Boca Raton, FL 33487-2742 © 2018 Vivek Kale CRC Press is an imprint of Taylor & Francis Group, an Informa business No claim to original U.S. Government works Printed on acid-free paper International Standard Book Number-13: 978-1-4987-5128-5 (Hardback) This book contains information obtained from authentic and highly regarded sources. Reasonable efforts have been made to publish reliable data and information, but the author and publisher cannot assume responsibility for the validity of all materials or the consequences of their use. The authors and publishers have attempted to trace the copyright holders of all material reproduced in this publication and apologize to copyright holders if permission to publish in this form has not been obtained. If any copyright material has not been acknowledged please write and let us know so we may rectify in any future reprint. Except as permitted under U.S. Copyright Law, no part of this book may be reprinted, reproduced, transmitted, or utilized in any form by any electronic, mechanical, or other means, now known or hereafter invented, including photocopying, microfilming, and recording, or in any information storage or retrieval system, without written permission from the publishers. For permission to photocopy or use material electronically from this work, please access www.copyright.com (http://www.copyright.com/) or contact the Copyright Clearance Center, Inc. (CCC), 222 Rosewood Drive, Danvers, MA 01923, 978-750-8400. CCC is a not-for-profit organization that provides licenses and registration for a variety of users. For organizations that have been granted a photocopy license by the CCC, a separate system of payment has been arranged. Trademark Notice: Product or corporate names may be trademarks or registered trademarks, and are used only for identification and explanation without intent to infringe. Library of Congress Cataloging-in-Publication Data Names: Kale, Vivek, author. Title: Creating smart enterprises : leveraging cloud, big data, web, social media, mobile and IoT technologies / Vivek Kale. Description: Boca Raton, FL : CRC Press, 2017. Identifiers: LCCN 2017019839 | ISBN 9781498751285 (hb : alk. paper) Subjects: LCSH: Technological innovations--Management. | Information technology--Management. Classification: LCC HD45 .K285 2017 | DDC 658.4/0630285--dc23 LC record available at https://lccn.loc.gov/2017019839 Visit the Taylor & Francis Web site at http://www.taylorandfrancis.com and the CRC Press Web site at http://www.crcpress.com To My wife, Girija who made me a better man, And whose smile brings light into my days. Your love and support encouraged me to chase my dreams, And any small success I have reached is as much yours as it is mine. Contents List of Figures ....................................................................................................xv List of Tables ...................................................................................................xvii Preface ..............................................................................................................xix Acknowledgments ..........................................................................................xxiii Author ..............................................................................................................xxv Other Books by Vivek Kale ..........................................................................xxvii 1 VUCA Ecosystem ...................................................................................1 1.1 VUCA Ecosystem .............................................................................1 1.2 Four Industrial Generations ..............................................................3 1.3 Trends ...............................................................................................4 1.3.1 Social Trends ........................................................................4 1.3.2 Organizational Trends ..........................................................5 1.3.3 Business Model Trends .........................................................7 1.3.4 Technology Trends ................................................................8 1.4 From Products to Services to Experiences ..........................................9 1.5 Technology Advancements ..............................................................10 1.6 Digital Economy .............................................................................14 1.7 Intelligent Analysis ..........................................................................17 1.7.1 Intelligence Maturity Model (IMM) ...................................19 1.7.1.1 Data .....................................................................20 1.7.1.2 Communication ...................................................20 1.7.1.3 Information ..........................................................20 1.7.1.4 Concept ...............................................................21 1.7.1.5 Knowledge ...........................................................21 1.7.1.6 Intelligence ...........................................................23 1.7.1.7 Wisdom ...............................................................24 1.8 SMACT Technologies .....................................................................24 1.9 Summary .........................................................................................26 2 Aligning Business and IT Strategy .......................................................27 2.1 Business Strategy .............................................................................28 2.1.1 Evolution of Strategy Management .....................................28 vii viii ◾ Contents 2.1.2.3 Porter’s Framework of Generic Strategies ............34 2.1.2.4 Porter’s Value Chain .............................................36 2.2 Information Technology and Information Systems (IT/IS).............40 2.2.1 Evolution of IT ...................................................................41 2.2.2 Evolution of IS ....................................................................43 2.2.3 IS/IT Governance ..............................................................44 2.2.3.1 Alignment IT/IS with Business Strategy ..............45 2.2.3.2 Aligning Business Goals and IT Goals .................48 2.2.3.3 Aligning Business with IT/IS and Business Value from IT ......................................................49 2.2.3.4 Governance Frameworks ......................................49 2.3 Summary .........................................................................................53 3 Enterprise Security ...............................................................................55 3.1 Concept of Security .........................................................................56 3.1.1 The Triad of Confidentiality, Integrity, and Availability ......56 3.1.1.1 Confidentiality .....................................................56 3.1.1.2 Integrity ...............................................................56 3.1.1.3 Availability ...........................................................57 3.1.2 Types of Attacks ..................................................................57 3.1.2.1 Interception ..........................................................57 3.1.2.2 Interruption .........................................................57 3.1.2.3 Modification ........................................................57 3.1.2.4 Fabrication ...........................................................58 3.1.3 Threats, Vulnerabilities, and Risk .......................................58 3.1.3.1 Threats .................................................................58 3.1.3.2 Vulnerabilities ......................................................58 3.1.3.3 Risk ......................................................................58 3.1.4 Controls ..............................................................................59 3.1.4.1 Physical ................................................................59 3.1.4.2 Logical .................................................................59 3.1.4.3 Administrative .....................................................59 3.1.5 Defense in Depth ................................................................60 3.2 Identification ...................................................................................60 3.2.1 Identity Verification ............................................................62 3.2.2 Identity Falsification ...........................................................63 3.3 Authentication .................................................................................63 3.3.1 Mutual Authentication ......................................................66 3.3.2 Multi-Factor Authentication ..............................................66 3.4 Authorization .................................................................................66 3.5 Access Control .................................................................................67 3.5.1 Access Control Models ........................................................70 3.6 Accountability .................................................................................72 Contents ◾ ix 3.6.1 Non-repudiation .................................................................73 3.6.2 Deterrence ..........................................................................73 3.6.3 Intrusion Detection and Prevention ....................................73 3.6.4 Admissibility of Records .....................................................74 3.7 Audit ...............................................................................................74 3.7.1 Logging ...............................................................................75 3.7.2 Monitoring .........................................................................76 3.7.3 Assessments .........................................................................76 3.8 Summary ........................................................................................77 4 Process-Driven Organization ...............................................................79 4.1 Process-Oriented Enterprise ............................................................80 4.1.1 Value-Add Driven Enterprise ..............................................81 4.2 Concept of Business Process Management (BPM) ...........................82 4.2.1 Business Process .................................................................84 4.3 Business Process Management (BPM) .............................................85 4.4 Enterprise BPM Methodology .........................................................87 4.4.1 Strategic Planning for Enterprise BPM ...............................89 4.4.1.1 Identifying the Business Processes in the Company ............................................................90 4.4.2 Selecting Business Processes for BPM ................................90 4.4.3 Creating Process Maps ........................................................91 4.4.4 Analyzing Processes for Breakthrough Improvements .........92 4.4.5 Innovative Breakthrough Improvement in Processes ...........93 4.4.6 Implementing Designed Processes ......................................93 4.4.7 Measuring the Performance of Designed Processes .............94 4.5 Business Process Reengineering (BPR) ............................................94 4.6 Management by Collaboration (MBC) ............................................98 4.7 Collaboration Technologies ...........................................................100 4.7.1 Synchronous Communication Tools .................................103 4.7.2 Asynchronous Communication Tools ...............................104 4.8 Collaborative Systems and Tools....................................................105 4.8.1 Skype ................................................................................105 4.8.2 Dropbox ............................................................................105 4.8.3 Google Drive and Google Docs ........................................105 4.8.4 Microsoft SkyDrive ...........................................................106 4.8.5 Microsoft OneNote ...........................................................106 4.9 Summary .......................................................................................107 5 Analytics .............................................................................................109 5.1 Decisions .......................................................................................110 5.1.1 Types of Decisions ............................................................110 5.1.2 Scope of Decisions ............................................................111 5.2 Decision-Making Process ..............................................................112

See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.