6. This research tries to investigate the privacy and security issues
plaguing mobile business Intelligence in today’s dynamic IT world.
Mobile Business Intelligence is the ability to access and perform data
analysis on a mobile device.
Due to the increase in smartphone usage, it became important for
ender-users to have access to and keep track of their business in any
place at any time thereby increasing the ability of on-time strategic
decision making.
Mobile Business Intelligence, however, can only be successfully
implemented if an organization is able to tackle specific challenges
that come with mobile devices. This research aim to introduce
measures that IT professionals can apply to successfully implement
Mobile Business Intelligence while providing security and privacy of
user data.
8. The main element technique for examining BI information is
utilizing proprietary software or a web browser on a personal
computer to connect to BI applications. These Business Intelligence
(BI) applications obtain data from databases. Since the late 1990s,
BI systems provided different options for acquiring data, as well
as email and mobile devices.
9. Mobile Business Intelligence is interpreted as “Mobile BI is
a system comprising both technical and organizational
elements that present historical and/or real-time
information to its users for analysis on mobile devices such
as smartphones and tablets (not laptops), to enable
effective decision-making and management support, for
the overall purpose of increasing firm performance.”
(Peters et al., 2016). BI refers to computer-based methods
utilized in noticing, findin, recognizing, and examining
business dataset, such as sales income by products and/or
departments or associated costs and incomes.
10. Even though the idea of mobile computing has been
widespread in a particular area for over a decade, Mobile BI
has caused a momentum/growth not long ago.This
alteration has been not completely supported by a change
from a world that has been using wires or cables technology
to transmit signals, to a wireless world with the advantage of
smartphones which has conducted us to a new era of
mobile computing, especially in the field of BI.
11. The security problems security and privacy problems within
mobile business intelligence are a substantial concern in
controlling and supporting business data. Business intelligence is
maintained contingent on the historical and present data in order
to evaluate and perform calculations on future data. Due to
security issues of Business intelligence the data can be at risk
because of the potential threats, loss of data and data
manipulation. Business intelligence is mostly determined by the
plugins which require internet connection.
Hypothesis support
12. Hypothesis support
Attackers can perform on the browser of the system
and destroy the plugins associated with it, if the
browser is not secured from antivirus and firewalls.
Absence in security characteristics of the device will
allow attackers to detect the details of the system and
execute attacks by altering and taking the data without
permission or legal rights. These types of attacks are
performed on purpose to take advantages of data from
anywhere by impeding the movement or progress of
the business intelligence
13. Data privacy and security in business intelligence and analytics
14. Business intelligence is mostly determined by the plugins which
require internet connection. Attackers can perform on the browser of
the system and destroy the plugins associated with it, if the browser
is not secured from antivirus and firewalls. Absence in security
characteristics of the device will allow attackers to detect the details
of the system and execute attacks by altering and taking the data
without permission or legal rights. These types of attacks are
performed on purpose to take advantages of data from anywhere by
impeding the movement or progress of the business intelligence
16. Most of the time, companies/ organizations have to make sure they
execute a powerful security arrangement to be able to preserve
sensitive information such as business and user data. Moreover, the
mobile strategy should be joining forces with existing security plan of
actions.
Mobile devices can effortlessly be hacked, misplaced or stolen. Utilizing
mobile BI may automatically put sensitive or personal information at
higher risk of being violated.
We choose this topic to find different ways that IT professionals should
implement in order to protect security and privacy within Mobile
Business Intelligence.
17. At the present time, IT developers are under increasing pressure to
make effective decisions and resolutions faster. When it comes to
businesses, Mobile business intelligence systems are used to keep
pace with rivals and to try to obtain an advantage over the
competition. This cannot be practical if the information used is out
of date.
18.
19. The consistent and continuous speed of business has now changed,
causing an unavoidable shift in the action or process of making
decisions. The spread of internet-enabled mobile devices has got to the
point where those devices should now take into consideration as a
major factor to rapid decision support.
One of the significant issues customers face when utilizing mobile
devices for information retrieval is the fact that mobile BI is security and
privacy. Furthermore, a mobile strategy has to be explained to manage
with different suppliers and systems as well as private phones.
20. IT developers are concerned that security and privacy within
Mobile Business Intelligence should be reinforced. A well
established concept and master plan must be in place before
supplying information to mobile devices.
Regardless of all the good things that mobile BI solutions bring, IT
developers are also subject to a number of objections when
trying to successfully bring about or reach a platform adoption:
Despite the prevailing circumstances of the delivery option, IT
developers have to take into consideration the degree to which a
mobile browser is able to be used. Displaying familiar content in a
mobile browser does not necessarily mean that it can be utilized
without conscious reasoning.
21.
22. Mobile BI app security plays a critical role because it provides a
secondary layer, similar to a pin on calling cards or remote access
devices. If the mobile device is lost or stolen, it helps protect the
downloaded information on the app. This becomes especially
critical if the mobile BI app has an offline functionality, which
allows full access to downloaded data without any Wi-Fi
connectivity, including during use in airplane mode. As a result, this
app layer security provides safeguarding of not only data in mobile
BI reports but also connection profiles such as server names, etc.
23. IT developers must take caution in designing the user interface to
ensure the acceptance of mobile apps, mostly in operational
scenarios where users may not be used to using BI.
When executing a mobile BI solution, security and privacy may
cause problems. IT developers have to make sure they execute a
strong security configuration in order to protect sensitive business
and user data. Moreover, the mobile strategy should be aligned
with existing security procedures.
25. Security is about the safeguarding of data, whereas privacy is about the
safeguarding of user identity. The specific differences, however, are more
complex, and there can certainly be areas of overlap between the two.
Although concepts of security and privacy are tangled, we know that it is
possible to have security without privacy, but impossible to have privacy
without security.
As technology advances, and use of technology increases, we become
more and more dependent on it. Our dependence, however, makes us
more vulnerable to security threats such as identity theft and email hacks.
26. Information systems and the data they contain have been compromised
because of inadequate security. The resulting loss of data can have
meaningful consequences to individuals whose data is stored on these
systems.
Even though mobile devices can be hacked without difficulty or effort,
lost or stolen. Utilizing mobile BI may consequently put sensitive or
private information at significant risk of being breached.
IT developers are working on discovering and identifying threats to
mobile devices by examining data that has no formal organization or
structure for security use, and increasing human cybersecurity.
27. There are several mobile devices and platforms available today. The
list is continuously growing and so is the platform support. There
are hundreds of models available today, with different hardware
and software combinations. Users and organizations have to select
devices very carefully. The target devices will impact the mobile BI
design itself because the design for a smartphone will be different
than for a tablet.
28. The mobile BI program must account for lack of device
standardization from the providers by constantly testing devices
for the mobile BI apps. Some best practices can always be
followed. For example, a smartphone is a good candidate for
operational mobile BI. However, for analytics and what-if analysis,
tablets are the best option.
Both privacy and security are important within Mobile Business
Intelligence and even though mobile apps still
Not one hundred percent secure, IT developers have become
more aware of how personal information, once shared anywhere
online, is no longer in the control of users .
29. APPENDIX
The following tools/resources were used in the process of
carrying out this research.
● WhatsApp
● Google Docs
● Kaggle
● VMware
● Google Drive
31. (PDF) Security and Privacy Issues for Business Intelligence in lOT. (n.d.). Retrieved December 13, 2020, from
https://www.researchgate.net/publication/332374230_Security_and_Privacy_Issues_for_Business_Intelligence_in_lOT
Andrey. (n.d.). Mobile Business Intelligence Security. Retrieved December 13, 2020, from
https://www.ndm.net/mobile/Good/good-mobile-business-intelligence-security
Beleuta, V. (1970, January 01). Data privacy and security in business intelligence and analytics: Semantic Scholar.
Retrieved December 13, 2020, from https://www.semanticscholar.org/paper/Data-privacy-and-security-in-business-
intelligence-Beleuta/93adc50037259b66127d5bf1ea6d15ee7dc1b893
Data Privacy vs. Data Security [definitions and comparisons]. (2020, November 26). Retrieved December 13, 2020,
from https://dataprivacymanager.net/security-vs-privacy/
Lindsay StaresOctober 17, 2. (n.d.). Data Digest: Mobile Security, Unstructured Data, Security Automation. Retrieved
December 13, 2020, from https://tdwi.org/articles/2017/10/17/adv-all-dwt-all-ai-security-1017.aspx
32. Mobile BI: Mobile Business Intelligence Definition. (2019, January 03). Retrieved December 13, 2020, from
https://www.logianalytics.com/resources/bi-encyclopedia/mobile-bi/
Mobile Business Intelligence (BI): Definition and Overview. (2020, December 01). Retrieved December 13, 2020, from
https://www.izenda.com/mobile-business-intelligence/
Mobile Business Intelligence (BI): Definition and Overview. (2020, December 01). Retrieved December 13, 2020, from
https://www.izenda.com/mobile-business-intelligence/
Mobile Business Intelligence - What it is and why it matters. (2020, November 23). Retrieved December 13, 2020, from
https://bi-survey.com/mobile-bi
Mobile business intelligence. (2020, April 06). Retrieved December 13, 2020, from
https://en.wikipedia.org/wiki/Mobile_business_intelligence
Screen, C. (n.d.). Best Practices in Mobile Business Intelligence. Retrieved December 13, 2020, from
https://blogs.oracle.com/profit/best-practices-in-mobile-business-intelligence
Turnali, A. (2017, March 28). 10 Mobile BI Strategy Questions: Security. Retrieved December 13, 2020, from
https://itpeernetwork.intel.com/10-mobile-bi-strategy-questions-security/
What Is Business Intelligence? Using Data Analytics in Business Strategy. (2020, February 03). Retrieved December 13,
2020, from https://onlinemasters.ohio.edu/blog/what-is-business-intelligence-using-data-analytics-in-business-strategy/