SlideShare a Scribd company logo
1 of 32
Security and privacy within
Mobile Business Intelligence
Casiana Nchama Mba Maye
Martina Ojonah
TABLE OF
CONTENTS
● Title ---------------------
Page
● Research Question-----------------------
Page
● Abstract ------------------------------------ Page
● Executive Summary ---------------------- Page
● Problem Statement/Solution ---------- Page
● Conclusion-------------------------------- Page
● Appendix--------------------------------- Page
● References------------------------------ Page
RESEARCH QUESTION
How Can IT Developers Reinforce The Security And Privacy
Within Mobile Business Intelligence?
ABSTRACT
This research tries to investigate the privacy and security issues
plaguing mobile business Intelligence in today’s dynamic IT world.
Mobile Business Intelligence is the ability to access and perform data
analysis on a mobile device.
Due to the increase in smartphone usage, it became important for
ender-users to have access to and keep track of their business in any
place at any time thereby increasing the ability of on-time strategic
decision making.
Mobile Business Intelligence, however, can only be successfully
implemented if an organization is able to tackle specific challenges
that come with mobile devices. This research aim to introduce
measures that IT professionals can apply to successfully implement
Mobile Business Intelligence while providing security and privacy of
user data.
EXECUTIVE
SUMMARY
The main element technique for examining BI information is
utilizing proprietary software or a web browser on a personal
computer to connect to BI applications. These Business Intelligence
(BI) applications obtain data from databases. Since the late 1990s,
BI systems provided different options for acquiring data, as well
as email and mobile devices.
Mobile Business Intelligence is interpreted as “Mobile BI is
a system comprising both technical and organizational
elements that present historical and/or real-time
information to its users for analysis on mobile devices such
as smartphones and tablets (not laptops), to enable
effective decision-making and management support, for
the overall purpose of increasing firm performance.”
(Peters et al., 2016). BI refers to computer-based methods
utilized in noticing, findin, recognizing, and examining
business dataset, such as sales income by products and/or
departments or associated costs and incomes.
Even though the idea of mobile computing has been
widespread in a particular area for over a decade, Mobile BI
has caused a momentum/growth not long ago.This
alteration has been not completely supported by a change
from a world that has been using wires or cables technology
to transmit signals, to a wireless world with the advantage of
smartphones which has conducted us to a new era of
mobile computing, especially in the field of BI.
The security problems security and privacy problems within
mobile business intelligence are a substantial concern in
controlling and supporting business data. Business intelligence is
maintained contingent on the historical and present data in order
to evaluate and perform calculations on future data. Due to
security issues of Business intelligence the data can be at risk
because of the potential threats, loss of data and data
manipulation. Business intelligence is mostly determined by the
plugins which require internet connection.
Hypothesis support
Hypothesis support
Attackers can perform on the browser of the system
and destroy the plugins associated with it, if the
browser is not secured from antivirus and firewalls.
Absence in security characteristics of the device will
allow attackers to detect the details of the system and
execute attacks by altering and taking the data without
permission or legal rights. These types of attacks are
performed on purpose to take advantages of data from
anywhere by impeding the movement or progress of
the business intelligence
Data privacy and security in business intelligence and analytics
Business intelligence is mostly determined by the plugins which
require internet connection. Attackers can perform on the browser of
the system and destroy the plugins associated with it, if the browser
is not secured from antivirus and firewalls. Absence in security
characteristics of the device will allow attackers to detect the details
of the system and execute attacks by altering and taking the data
without permission or legal rights. These types of attacks are
performed on purpose to take advantages of data from anywhere by
impeding the movement or progress of the business intelligence
PROBLEM
STATEMENT/
SOLUTION
Most of the time, companies/ organizations have to make sure they
execute a powerful security arrangement to be able to preserve
sensitive information such as business and user data. Moreover, the
mobile strategy should be joining forces with existing security plan of
actions.
Mobile devices can effortlessly be hacked, misplaced or stolen. Utilizing
mobile BI may automatically put sensitive or personal information at
higher risk of being violated.
We choose this topic to find different ways that IT professionals should
implement in order to protect security and privacy within Mobile
Business Intelligence.
At the present time, IT developers are under increasing pressure to
make effective decisions and resolutions faster. When it comes to
businesses, Mobile business intelligence systems are used to keep
pace with rivals and to try to obtain an advantage over the
competition. This cannot be practical if the information used is out
of date.
The consistent and continuous speed of business has now changed,
causing an unavoidable shift in the action or process of making
decisions. The spread of internet-enabled mobile devices has got to the
point where those devices should now take into consideration as a
major factor to rapid decision support.
One of the significant issues customers face when utilizing mobile
devices for information retrieval is the fact that mobile BI is security and
privacy. Furthermore, a mobile strategy has to be explained to manage
with different suppliers and systems as well as private phones.
IT developers are concerned that security and privacy within
Mobile Business Intelligence should be reinforced. A well
established concept and master plan must be in place before
supplying information to mobile devices.
Regardless of all the good things that mobile BI solutions bring, IT
developers are also subject to a number of objections when
trying to successfully bring about or reach a platform adoption:
Despite the prevailing circumstances of the delivery option, IT
developers have to take into consideration the degree to which a
mobile browser is able to be used. Displaying familiar content in a
mobile browser does not necessarily mean that it can be utilized
without conscious reasoning.
Mobile BI app security plays a critical role because it provides a
secondary layer, similar to a pin on calling cards or remote access
devices. If the mobile device is lost or stolen, it helps protect the
downloaded information on the app. This becomes especially
critical if the mobile BI app has an offline functionality, which
allows full access to downloaded data without any Wi-Fi
connectivity, including during use in airplane mode. As a result, this
app layer security provides safeguarding of not only data in mobile
BI reports but also connection profiles such as server names, etc.
IT developers must take caution in designing the user interface to
ensure the acceptance of mobile apps, mostly in operational
scenarios where users may not be used to using BI.
When executing a mobile BI solution, security and privacy may
cause problems. IT developers have to make sure they execute a
strong security configuration in order to protect sensitive business
and user data. Moreover, the mobile strategy should be aligned
with existing security procedures.
CONCLUSION
Security is about the safeguarding of data, whereas privacy is about the
safeguarding of user identity. The specific differences, however, are more
complex, and there can certainly be areas of overlap between the two.
Although concepts of security and privacy are tangled, we know that it is
possible to have security without privacy, but impossible to have privacy
without security.
As technology advances, and use of technology increases, we become
more and more dependent on it. Our dependence, however, makes us
more vulnerable to security threats such as identity theft and email hacks.
Information systems and the data they contain have been compromised
because of inadequate security. The resulting loss of data can have
meaningful consequences to individuals whose data is stored on these
systems.
Even though mobile devices can be hacked without difficulty or effort,
lost or stolen. Utilizing mobile BI may consequently put sensitive or
private information at significant risk of being breached.
IT developers are working on discovering and identifying threats to
mobile devices by examining data that has no formal organization or
structure for security use, and increasing human cybersecurity.
There are several mobile devices and platforms available today. The
list is continuously growing and so is the platform support. There
are hundreds of models available today, with different hardware
and software combinations. Users and organizations have to select
devices very carefully. The target devices will impact the mobile BI
design itself because the design for a smartphone will be different
than for a tablet.
The mobile BI program must account for lack of device
standardization from the providers by constantly testing devices
for the mobile BI apps. Some best practices can always be
followed. For example, a smartphone is a good candidate for
operational mobile BI. However, for analytics and what-if analysis,
tablets are the best option.
Both privacy and security are important within Mobile Business
Intelligence and even though mobile apps still
Not one hundred percent secure, IT developers have become
more aware of how personal information, once shared anywhere
online, is no longer in the control of users .
APPENDIX
The following tools/resources were used in the process of
carrying out this research.
● WhatsApp
● Google Docs
● Kaggle
● VMware
● Google Drive
REFERENCES
(PDF) Security and Privacy Issues for Business Intelligence in lOT. (n.d.). Retrieved December 13, 2020, from
https://www.researchgate.net/publication/332374230_Security_and_Privacy_Issues_for_Business_Intelligence_in_lOT
Andrey. (n.d.). Mobile Business Intelligence Security. Retrieved December 13, 2020, from
https://www.ndm.net/mobile/Good/good-mobile-business-intelligence-security
Beleuta, V. (1970, January 01). Data privacy and security in business intelligence and analytics: Semantic Scholar.
Retrieved December 13, 2020, from https://www.semanticscholar.org/paper/Data-privacy-and-security-in-business-
intelligence-Beleuta/93adc50037259b66127d5bf1ea6d15ee7dc1b893
Data Privacy vs. Data Security [definitions and comparisons]. (2020, November 26). Retrieved December 13, 2020,
from https://dataprivacymanager.net/security-vs-privacy/
Lindsay StaresOctober 17, 2. (n.d.). Data Digest: Mobile Security, Unstructured Data, Security Automation. Retrieved
December 13, 2020, from https://tdwi.org/articles/2017/10/17/adv-all-dwt-all-ai-security-1017.aspx
Mobile BI: Mobile Business Intelligence Definition. (2019, January 03). Retrieved December 13, 2020, from
https://www.logianalytics.com/resources/bi-encyclopedia/mobile-bi/
Mobile Business Intelligence (BI): Definition and Overview. (2020, December 01). Retrieved December 13, 2020, from
https://www.izenda.com/mobile-business-intelligence/
Mobile Business Intelligence (BI): Definition and Overview. (2020, December 01). Retrieved December 13, 2020, from
https://www.izenda.com/mobile-business-intelligence/
Mobile Business Intelligence - What it is and why it matters. (2020, November 23). Retrieved December 13, 2020, from
https://bi-survey.com/mobile-bi
Mobile business intelligence. (2020, April 06). Retrieved December 13, 2020, from
https://en.wikipedia.org/wiki/Mobile_business_intelligence
Screen, C. (n.d.). Best Practices in Mobile Business Intelligence. Retrieved December 13, 2020, from
https://blogs.oracle.com/profit/best-practices-in-mobile-business-intelligence
Turnali, A. (2017, March 28). 10 Mobile BI Strategy Questions: Security. Retrieved December 13, 2020, from
https://itpeernetwork.intel.com/10-mobile-bi-strategy-questions-security/
What Is Business Intelligence? Using Data Analytics in Business Strategy. (2020, February 03). Retrieved December 13,
2020, from https://onlinemasters.ohio.edu/blog/what-is-business-intelligence-using-data-analytics-in-business-strategy/

More Related Content

What's hot

Securely Adopting Mobile Technology Innovations
Securely Adopting Mobile Technology InnovationsSecurely Adopting Mobile Technology Innovations
Securely Adopting Mobile Technology InnovationsIBM Software India
 
TWO-LAYER SECURE PREVENTION MECHANISM FOR REDUCING E-COMMERCE SECURITY RISKS
TWO-LAYER SECURE PREVENTION MECHANISM FOR REDUCING E-COMMERCE SECURITY RISKSTWO-LAYER SECURE PREVENTION MECHANISM FOR REDUCING E-COMMERCE SECURITY RISKS
TWO-LAYER SECURE PREVENTION MECHANISM FOR REDUCING E-COMMERCE SECURITY RISKSijcsit
 
IBM Connect 2013: BYOD at IBM
IBM Connect 2013: BYOD at IBMIBM Connect 2013: BYOD at IBM
IBM Connect 2013: BYOD at IBMChris Pepin
 
Social, political and technological considerations for national identity mana...
Social, political and technological considerations for national identity mana...Social, political and technological considerations for national identity mana...
Social, political and technological considerations for national identity mana...Ravinder (Ravi) Singh
 
Maintain data privacy during software development
Maintain data privacy during software developmentMaintain data privacy during software development
Maintain data privacy during software developmentMuhammadArif823
 
The Essential Ingredient for Today's Enterprise
The Essential Ingredient for Today's EnterpriseThe Essential Ingredient for Today's Enterprise
The Essential Ingredient for Today's EnterpriseReadWrite
 
Whitepaper Real Time Transaction Analysis And Fraudulent Transaction Detect...
Whitepaper   Real Time Transaction Analysis And Fraudulent Transaction Detect...Whitepaper   Real Time Transaction Analysis And Fraudulent Transaction Detect...
Whitepaper Real Time Transaction Analysis And Fraudulent Transaction Detect...Alan McSweeney
 
FTC- Internet of Things (January, 2015)
FTC- Internet of Things (January, 2015)FTC- Internet of Things (January, 2015)
FTC- Internet of Things (January, 2015)Dr Dev Kambhampati
 
MOBILE AND WEB BASED REMOTE BUSINESS MONITORING SYSTEM
MOBILE AND WEB BASED REMOTE BUSINESS MONITORING SYSTEMMOBILE AND WEB BASED REMOTE BUSINESS MONITORING SYSTEM
MOBILE AND WEB BASED REMOTE BUSINESS MONITORING SYSTEMijait
 
Developing Enterprise Cyber Situational Awareness
Developing Enterprise Cyber Situational AwarenessDeveloping Enterprise Cyber Situational Awareness
Developing Enterprise Cyber Situational AwarenessIJMIT JOURNAL
 
20100224 Presentation at RGIT Mumbai - Information Security Awareness
20100224 Presentation at RGIT Mumbai - Information Security Awareness20100224 Presentation at RGIT Mumbai - Information Security Awareness
20100224 Presentation at RGIT Mumbai - Information Security AwarenessDinesh O Bareja
 
Challenges and Security Issues in Future IT Infrastructure Components
Challenges and Security Issues in Future IT Infrastructure ComponentsChallenges and Security Issues in Future IT Infrastructure Components
Challenges and Security Issues in Future IT Infrastructure ComponentsMubashir Ali
 
Fitsum ristu lakew transaction security on e-commerce
Fitsum ristu lakew transaction security on e-commerceFitsum ristu lakew transaction security on e-commerce
Fitsum ristu lakew transaction security on e-commerceFITSUM RISTU LAKEW
 
IBM Mobile devices Whitepaper
IBM Mobile devices WhitepaperIBM Mobile devices Whitepaper
IBM Mobile devices WhitepaperShetal Patel
 
PulseSecure_Report_HybridIT_120715
PulseSecure_Report_HybridIT_120715PulseSecure_Report_HybridIT_120715
PulseSecure_Report_HybridIT_120715Jim Romeo
 
170105 d link-complaint_and_exhibits
170105 d link-complaint_and_exhibits170105 d link-complaint_and_exhibits
170105 d link-complaint_and_exhibitsAndrey Apuhtin
 
Privacy and security policies in supply chain
Privacy and security policies in supply chainPrivacy and security policies in supply chain
Privacy and security policies in supply chainVanya Vladeva
 

What's hot (18)

Securely Adopting Mobile Technology Innovations
Securely Adopting Mobile Technology InnovationsSecurely Adopting Mobile Technology Innovations
Securely Adopting Mobile Technology Innovations
 
TWO-LAYER SECURE PREVENTION MECHANISM FOR REDUCING E-COMMERCE SECURITY RISKS
TWO-LAYER SECURE PREVENTION MECHANISM FOR REDUCING E-COMMERCE SECURITY RISKSTWO-LAYER SECURE PREVENTION MECHANISM FOR REDUCING E-COMMERCE SECURITY RISKS
TWO-LAYER SECURE PREVENTION MECHANISM FOR REDUCING E-COMMERCE SECURITY RISKS
 
IBM Connect 2013: BYOD at IBM
IBM Connect 2013: BYOD at IBMIBM Connect 2013: BYOD at IBM
IBM Connect 2013: BYOD at IBM
 
Social, political and technological considerations for national identity mana...
Social, political and technological considerations for national identity mana...Social, political and technological considerations for national identity mana...
Social, political and technological considerations for national identity mana...
 
Maintain data privacy during software development
Maintain data privacy during software developmentMaintain data privacy during software development
Maintain data privacy during software development
 
The Essential Ingredient for Today's Enterprise
The Essential Ingredient for Today's EnterpriseThe Essential Ingredient for Today's Enterprise
The Essential Ingredient for Today's Enterprise
 
Whitepaper Real Time Transaction Analysis And Fraudulent Transaction Detect...
Whitepaper   Real Time Transaction Analysis And Fraudulent Transaction Detect...Whitepaper   Real Time Transaction Analysis And Fraudulent Transaction Detect...
Whitepaper Real Time Transaction Analysis And Fraudulent Transaction Detect...
 
FTC- Internet of Things (January, 2015)
FTC- Internet of Things (January, 2015)FTC- Internet of Things (January, 2015)
FTC- Internet of Things (January, 2015)
 
MOBILE AND WEB BASED REMOTE BUSINESS MONITORING SYSTEM
MOBILE AND WEB BASED REMOTE BUSINESS MONITORING SYSTEMMOBILE AND WEB BASED REMOTE BUSINESS MONITORING SYSTEM
MOBILE AND WEB BASED REMOTE BUSINESS MONITORING SYSTEM
 
Developing Enterprise Cyber Situational Awareness
Developing Enterprise Cyber Situational AwarenessDeveloping Enterprise Cyber Situational Awareness
Developing Enterprise Cyber Situational Awareness
 
20100224 Presentation at RGIT Mumbai - Information Security Awareness
20100224 Presentation at RGIT Mumbai - Information Security Awareness20100224 Presentation at RGIT Mumbai - Information Security Awareness
20100224 Presentation at RGIT Mumbai - Information Security Awareness
 
Challenges and Security Issues in Future IT Infrastructure Components
Challenges and Security Issues in Future IT Infrastructure ComponentsChallenges and Security Issues in Future IT Infrastructure Components
Challenges and Security Issues in Future IT Infrastructure Components
 
Fitsum ristu lakew transaction security on e-commerce
Fitsum ristu lakew transaction security on e-commerceFitsum ristu lakew transaction security on e-commerce
Fitsum ristu lakew transaction security on e-commerce
 
IBM Mobile devices Whitepaper
IBM Mobile devices WhitepaperIBM Mobile devices Whitepaper
IBM Mobile devices Whitepaper
 
Assessment and Mitigation of Risks Involved in Electronics Payment Systems
Assessment and Mitigation of Risks Involved in Electronics Payment Systems Assessment and Mitigation of Risks Involved in Electronics Payment Systems
Assessment and Mitigation of Risks Involved in Electronics Payment Systems
 
PulseSecure_Report_HybridIT_120715
PulseSecure_Report_HybridIT_120715PulseSecure_Report_HybridIT_120715
PulseSecure_Report_HybridIT_120715
 
170105 d link-complaint_and_exhibits
170105 d link-complaint_and_exhibits170105 d link-complaint_and_exhibits
170105 d link-complaint_and_exhibits
 
Privacy and security policies in supply chain
Privacy and security policies in supply chainPrivacy and security policies in supply chain
Privacy and security policies in supply chain
 

Similar to Business Intelligence Research Project

Security Implications of Accenture Technology Vision 2015 - Executive Report
Security Implications of Accenture Technology Vision 2015 - Executive ReportSecurity Implications of Accenture Technology Vision 2015 - Executive Report
Security Implications of Accenture Technology Vision 2015 - Executive ReportAccenture Technology
 
A Business-Driven Approach to Mobile Enterprise Security
A Business-Driven Approach to Mobile Enterprise SecurityA Business-Driven Approach to Mobile Enterprise Security
A Business-Driven Approach to Mobile Enterprise SecurityТранслируем.бел
 
Pdf wp-emc-mozyenterprise-hybrid-cloud-backup
Pdf wp-emc-mozyenterprise-hybrid-cloud-backupPdf wp-emc-mozyenterprise-hybrid-cloud-backup
Pdf wp-emc-mozyenterprise-hybrid-cloud-backuplverb
 
Consider byoc as part of desktop as service strategy
Consider byoc as part of desktop as service strategyConsider byoc as part of desktop as service strategy
Consider byoc as part of desktop as service strategyInfo-Tech Research Group
 
BYOD SCOPE: A Study of Corporate Policies in Pakistan
BYOD SCOPE: A Study of Corporate Policies in PakistanBYOD SCOPE: A Study of Corporate Policies in Pakistan
BYOD SCOPE: A Study of Corporate Policies in PakistanShuja Ahmad
 
Securing a mobile oriented enterprise
Securing a mobile oriented enterpriseSecuring a mobile oriented enterprise
Securing a mobile oriented enterpriseinfra-si
 
PingPal infodeck: How to survive BYOD and mobile networks
PingPal infodeck: How to survive BYOD and mobile networksPingPal infodeck: How to survive BYOD and mobile networks
PingPal infodeck: How to survive BYOD and mobile networksHyker Security
 
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)Pace IT at Edmonds Community College
 
The impact of mobile on the IT organization
The impact of mobile on the IT organizationThe impact of mobile on the IT organization
The impact of mobile on the IT organizationChris Pepin
 
10 Reasons to Strengthen Security with App & Desktop Virtualization
10 Reasons to Strengthen Security with App & Desktop Virtualization10 Reasons to Strengthen Security with App & Desktop Virtualization
10 Reasons to Strengthen Security with App & Desktop VirtualizationCitrix
 
Secure Mobile BI on Apple devices
Secure Mobile BI on Apple devicesSecure Mobile BI on Apple devices
Secure Mobile BI on Apple devicesBiBoard.Org
 
Sandy DiFranco Portfolio
Sandy DiFranco PortfolioSandy DiFranco Portfolio
Sandy DiFranco PortfolioSandy DiFranco
 
Securely adopting mobile technology innovations for your enterprise using ibm...
Securely adopting mobile technology innovations for your enterprise using ibm...Securely adopting mobile technology innovations for your enterprise using ibm...
Securely adopting mobile technology innovations for your enterprise using ibm...bupbechanhgmail
 
Accelerating Innovation Through Enterprise Mobility
Accelerating Innovation Through Enterprise MobilityAccelerating Innovation Through Enterprise Mobility
Accelerating Innovation Through Enterprise MobilityMelissa Luongo
 
From Device Selection to Data Protection: Selecting the Right Mobility Soluti...
From Device Selection to Data Protection: Selecting the Right Mobility Soluti...From Device Selection to Data Protection: Selecting the Right Mobility Soluti...
From Device Selection to Data Protection: Selecting the Right Mobility Soluti...Enterprise Mobile
 
Content Marketing Trending Topics in Tech
Content Marketing Trending Topics in TechContent Marketing Trending Topics in Tech
Content Marketing Trending Topics in TechUBM (Technology)
 

Similar to Business Intelligence Research Project (20)

Leveraging byod
Leveraging byodLeveraging byod
Leveraging byod
 
Embracing BYOD
Embracing BYODEmbracing BYOD
Embracing BYOD
 
Security Implications of Accenture Technology Vision 2015 - Executive Report
Security Implications of Accenture Technology Vision 2015 - Executive ReportSecurity Implications of Accenture Technology Vision 2015 - Executive Report
Security Implications of Accenture Technology Vision 2015 - Executive Report
 
A Business-Driven Approach to Mobile Enterprise Security
A Business-Driven Approach to Mobile Enterprise SecurityA Business-Driven Approach to Mobile Enterprise Security
A Business-Driven Approach to Mobile Enterprise Security
 
Enterprise mobility
Enterprise mobilityEnterprise mobility
Enterprise mobility
 
Pdf wp-emc-mozyenterprise-hybrid-cloud-backup
Pdf wp-emc-mozyenterprise-hybrid-cloud-backupPdf wp-emc-mozyenterprise-hybrid-cloud-backup
Pdf wp-emc-mozyenterprise-hybrid-cloud-backup
 
Consider byoc as part of desktop as service strategy
Consider byoc as part of desktop as service strategyConsider byoc as part of desktop as service strategy
Consider byoc as part of desktop as service strategy
 
BYOD SCOPE: A Study of Corporate Policies in Pakistan
BYOD SCOPE: A Study of Corporate Policies in PakistanBYOD SCOPE: A Study of Corporate Policies in Pakistan
BYOD SCOPE: A Study of Corporate Policies in Pakistan
 
Securing a mobile oriented enterprise
Securing a mobile oriented enterpriseSecuring a mobile oriented enterprise
Securing a mobile oriented enterprise
 
PingPal infodeck: How to survive BYOD and mobile networks
PingPal infodeck: How to survive BYOD and mobile networksPingPal infodeck: How to survive BYOD and mobile networks
PingPal infodeck: How to survive BYOD and mobile networks
 
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
 
The impact of mobile on the IT organization
The impact of mobile on the IT organizationThe impact of mobile on the IT organization
The impact of mobile on the IT organization
 
Securing mobile apps in a BYOD world
Securing mobile apps in a BYOD worldSecuring mobile apps in a BYOD world
Securing mobile apps in a BYOD world
 
10 Reasons to Strengthen Security with App & Desktop Virtualization
10 Reasons to Strengthen Security with App & Desktop Virtualization10 Reasons to Strengthen Security with App & Desktop Virtualization
10 Reasons to Strengthen Security with App & Desktop Virtualization
 
Secure Mobile BI on Apple devices
Secure Mobile BI on Apple devicesSecure Mobile BI on Apple devices
Secure Mobile BI on Apple devices
 
Sandy DiFranco Portfolio
Sandy DiFranco PortfolioSandy DiFranco Portfolio
Sandy DiFranco Portfolio
 
Securely adopting mobile technology innovations for your enterprise using ibm...
Securely adopting mobile technology innovations for your enterprise using ibm...Securely adopting mobile technology innovations for your enterprise using ibm...
Securely adopting mobile technology innovations for your enterprise using ibm...
 
Accelerating Innovation Through Enterprise Mobility
Accelerating Innovation Through Enterprise MobilityAccelerating Innovation Through Enterprise Mobility
Accelerating Innovation Through Enterprise Mobility
 
From Device Selection to Data Protection: Selecting the Right Mobility Soluti...
From Device Selection to Data Protection: Selecting the Right Mobility Soluti...From Device Selection to Data Protection: Selecting the Right Mobility Soluti...
From Device Selection to Data Protection: Selecting the Right Mobility Soluti...
 
Content Marketing Trending Topics in Tech
Content Marketing Trending Topics in TechContent Marketing Trending Topics in Tech
Content Marketing Trending Topics in Tech
 

Recently uploaded

The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdfChristopherTHyatt
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 

Recently uploaded (20)

The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 

Business Intelligence Research Project

  • 1. Security and privacy within Mobile Business Intelligence Casiana Nchama Mba Maye Martina Ojonah
  • 2. TABLE OF CONTENTS ● Title --------------------- Page ● Research Question----------------------- Page ● Abstract ------------------------------------ Page ● Executive Summary ---------------------- Page ● Problem Statement/Solution ---------- Page ● Conclusion-------------------------------- Page ● Appendix--------------------------------- Page ● References------------------------------ Page
  • 4. How Can IT Developers Reinforce The Security And Privacy Within Mobile Business Intelligence?
  • 6. This research tries to investigate the privacy and security issues plaguing mobile business Intelligence in today’s dynamic IT world. Mobile Business Intelligence is the ability to access and perform data analysis on a mobile device. Due to the increase in smartphone usage, it became important for ender-users to have access to and keep track of their business in any place at any time thereby increasing the ability of on-time strategic decision making. Mobile Business Intelligence, however, can only be successfully implemented if an organization is able to tackle specific challenges that come with mobile devices. This research aim to introduce measures that IT professionals can apply to successfully implement Mobile Business Intelligence while providing security and privacy of user data.
  • 8. The main element technique for examining BI information is utilizing proprietary software or a web browser on a personal computer to connect to BI applications. These Business Intelligence (BI) applications obtain data from databases. Since the late 1990s, BI systems provided different options for acquiring data, as well as email and mobile devices.
  • 9. Mobile Business Intelligence is interpreted as “Mobile BI is a system comprising both technical and organizational elements that present historical and/or real-time information to its users for analysis on mobile devices such as smartphones and tablets (not laptops), to enable effective decision-making and management support, for the overall purpose of increasing firm performance.” (Peters et al., 2016). BI refers to computer-based methods utilized in noticing, findin, recognizing, and examining business dataset, such as sales income by products and/or departments or associated costs and incomes.
  • 10. Even though the idea of mobile computing has been widespread in a particular area for over a decade, Mobile BI has caused a momentum/growth not long ago.This alteration has been not completely supported by a change from a world that has been using wires or cables technology to transmit signals, to a wireless world with the advantage of smartphones which has conducted us to a new era of mobile computing, especially in the field of BI.
  • 11. The security problems security and privacy problems within mobile business intelligence are a substantial concern in controlling and supporting business data. Business intelligence is maintained contingent on the historical and present data in order to evaluate and perform calculations on future data. Due to security issues of Business intelligence the data can be at risk because of the potential threats, loss of data and data manipulation. Business intelligence is mostly determined by the plugins which require internet connection. Hypothesis support
  • 12. Hypothesis support Attackers can perform on the browser of the system and destroy the plugins associated with it, if the browser is not secured from antivirus and firewalls. Absence in security characteristics of the device will allow attackers to detect the details of the system and execute attacks by altering and taking the data without permission or legal rights. These types of attacks are performed on purpose to take advantages of data from anywhere by impeding the movement or progress of the business intelligence
  • 13. Data privacy and security in business intelligence and analytics
  • 14. Business intelligence is mostly determined by the plugins which require internet connection. Attackers can perform on the browser of the system and destroy the plugins associated with it, if the browser is not secured from antivirus and firewalls. Absence in security characteristics of the device will allow attackers to detect the details of the system and execute attacks by altering and taking the data without permission or legal rights. These types of attacks are performed on purpose to take advantages of data from anywhere by impeding the movement or progress of the business intelligence
  • 16. Most of the time, companies/ organizations have to make sure they execute a powerful security arrangement to be able to preserve sensitive information such as business and user data. Moreover, the mobile strategy should be joining forces with existing security plan of actions. Mobile devices can effortlessly be hacked, misplaced or stolen. Utilizing mobile BI may automatically put sensitive or personal information at higher risk of being violated. We choose this topic to find different ways that IT professionals should implement in order to protect security and privacy within Mobile Business Intelligence.
  • 17. At the present time, IT developers are under increasing pressure to make effective decisions and resolutions faster. When it comes to businesses, Mobile business intelligence systems are used to keep pace with rivals and to try to obtain an advantage over the competition. This cannot be practical if the information used is out of date.
  • 18.
  • 19. The consistent and continuous speed of business has now changed, causing an unavoidable shift in the action or process of making decisions. The spread of internet-enabled mobile devices has got to the point where those devices should now take into consideration as a major factor to rapid decision support. One of the significant issues customers face when utilizing mobile devices for information retrieval is the fact that mobile BI is security and privacy. Furthermore, a mobile strategy has to be explained to manage with different suppliers and systems as well as private phones.
  • 20. IT developers are concerned that security and privacy within Mobile Business Intelligence should be reinforced. A well established concept and master plan must be in place before supplying information to mobile devices. Regardless of all the good things that mobile BI solutions bring, IT developers are also subject to a number of objections when trying to successfully bring about or reach a platform adoption: Despite the prevailing circumstances of the delivery option, IT developers have to take into consideration the degree to which a mobile browser is able to be used. Displaying familiar content in a mobile browser does not necessarily mean that it can be utilized without conscious reasoning.
  • 21.
  • 22. Mobile BI app security plays a critical role because it provides a secondary layer, similar to a pin on calling cards or remote access devices. If the mobile device is lost or stolen, it helps protect the downloaded information on the app. This becomes especially critical if the mobile BI app has an offline functionality, which allows full access to downloaded data without any Wi-Fi connectivity, including during use in airplane mode. As a result, this app layer security provides safeguarding of not only data in mobile BI reports but also connection profiles such as server names, etc.
  • 23. IT developers must take caution in designing the user interface to ensure the acceptance of mobile apps, mostly in operational scenarios where users may not be used to using BI. When executing a mobile BI solution, security and privacy may cause problems. IT developers have to make sure they execute a strong security configuration in order to protect sensitive business and user data. Moreover, the mobile strategy should be aligned with existing security procedures.
  • 25. Security is about the safeguarding of data, whereas privacy is about the safeguarding of user identity. The specific differences, however, are more complex, and there can certainly be areas of overlap between the two. Although concepts of security and privacy are tangled, we know that it is possible to have security without privacy, but impossible to have privacy without security. As technology advances, and use of technology increases, we become more and more dependent on it. Our dependence, however, makes us more vulnerable to security threats such as identity theft and email hacks.
  • 26. Information systems and the data they contain have been compromised because of inadequate security. The resulting loss of data can have meaningful consequences to individuals whose data is stored on these systems. Even though mobile devices can be hacked without difficulty or effort, lost or stolen. Utilizing mobile BI may consequently put sensitive or private information at significant risk of being breached. IT developers are working on discovering and identifying threats to mobile devices by examining data that has no formal organization or structure for security use, and increasing human cybersecurity.
  • 27. There are several mobile devices and platforms available today. The list is continuously growing and so is the platform support. There are hundreds of models available today, with different hardware and software combinations. Users and organizations have to select devices very carefully. The target devices will impact the mobile BI design itself because the design for a smartphone will be different than for a tablet.
  • 28. The mobile BI program must account for lack of device standardization from the providers by constantly testing devices for the mobile BI apps. Some best practices can always be followed. For example, a smartphone is a good candidate for operational mobile BI. However, for analytics and what-if analysis, tablets are the best option. Both privacy and security are important within Mobile Business Intelligence and even though mobile apps still Not one hundred percent secure, IT developers have become more aware of how personal information, once shared anywhere online, is no longer in the control of users .
  • 29. APPENDIX The following tools/resources were used in the process of carrying out this research. ● WhatsApp ● Google Docs ● Kaggle ● VMware ● Google Drive
  • 31. (PDF) Security and Privacy Issues for Business Intelligence in lOT. (n.d.). Retrieved December 13, 2020, from https://www.researchgate.net/publication/332374230_Security_and_Privacy_Issues_for_Business_Intelligence_in_lOT Andrey. (n.d.). Mobile Business Intelligence Security. Retrieved December 13, 2020, from https://www.ndm.net/mobile/Good/good-mobile-business-intelligence-security Beleuta, V. (1970, January 01). Data privacy and security in business intelligence and analytics: Semantic Scholar. Retrieved December 13, 2020, from https://www.semanticscholar.org/paper/Data-privacy-and-security-in-business- intelligence-Beleuta/93adc50037259b66127d5bf1ea6d15ee7dc1b893 Data Privacy vs. Data Security [definitions and comparisons]. (2020, November 26). Retrieved December 13, 2020, from https://dataprivacymanager.net/security-vs-privacy/ Lindsay StaresOctober 17, 2. (n.d.). Data Digest: Mobile Security, Unstructured Data, Security Automation. Retrieved December 13, 2020, from https://tdwi.org/articles/2017/10/17/adv-all-dwt-all-ai-security-1017.aspx
  • 32. Mobile BI: Mobile Business Intelligence Definition. (2019, January 03). Retrieved December 13, 2020, from https://www.logianalytics.com/resources/bi-encyclopedia/mobile-bi/ Mobile Business Intelligence (BI): Definition and Overview. (2020, December 01). Retrieved December 13, 2020, from https://www.izenda.com/mobile-business-intelligence/ Mobile Business Intelligence (BI): Definition and Overview. (2020, December 01). Retrieved December 13, 2020, from https://www.izenda.com/mobile-business-intelligence/ Mobile Business Intelligence - What it is and why it matters. (2020, November 23). Retrieved December 13, 2020, from https://bi-survey.com/mobile-bi Mobile business intelligence. (2020, April 06). Retrieved December 13, 2020, from https://en.wikipedia.org/wiki/Mobile_business_intelligence Screen, C. (n.d.). Best Practices in Mobile Business Intelligence. Retrieved December 13, 2020, from https://blogs.oracle.com/profit/best-practices-in-mobile-business-intelligence Turnali, A. (2017, March 28). 10 Mobile BI Strategy Questions: Security. Retrieved December 13, 2020, from https://itpeernetwork.intel.com/10-mobile-bi-strategy-questions-security/ What Is Business Intelligence? Using Data Analytics in Business Strategy. (2020, February 03). Retrieved December 13, 2020, from https://onlinemasters.ohio.edu/blog/what-is-business-intelligence-using-data-analytics-in-business-strategy/