StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Enterprise Information Architecture - Essay Example

Comments (0) Cite this document
Summary
Privacy and protection of personal data has always been an issue and especially in this century since everything is accessible and open to the world. Technology works against technology and protection of personal or critical data has become increasingly important since information is the basis to all the major problems in the world…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER97.1% of users find it useful
Enterprise Information Architecture
Read TextPreview

Extract of sample "Enterprise Information Architecture"

Download file to see previous pages Data security helps maintain privacy of data. There are a number of data security technologies to support this process. They are as follows:
The topic of my research paper is Enterprise Information Architecture that strategically brings together the information architecture of the organization in a well-documented and logical manner. EAI integrates the information architecture of within an organization in such a way that the organization wide elements of goals, objectives, strategic plans etc also encompass within the architecture.1
EAI aims to provide an architectured environment to the organization that delivers high quality, system integration, time saving and reduction in costs. This aim is achieved by EAI by eradicating or reducing data redundancy within the operational systems, eradicating or reducing process redundancy within the operational systems, and by minimizing the complexity of extracting data from the operational environment into the data warehouse environment. The EAI is often known as a vehicle that provides a road map to development of an architectured environment. The EIA has three sub-architectures and they are as follows:
Business architecture: This includes corporate data model (business oriented and integrated view of the data that is important to the organization), function model (decomposes the core business functions performed within the organization), interaction model (a matrix that shows which data is updated, deleted or important), current systems model (inventory of current systems implemented within the organization).
Technical architecture: This depicts the existing and desired technical environment of the organization. It also includes an inventory of the systems of the existing technical environment as well.
Organization architecture: This reveals the processes from the function model that are performed by each unit within the organization. It also shows the organizational structure but at a higher level.
Below is the breakdown of the EIA:
Enterprise information architecture is a model that has four levels and they are as follows:
Physical level: This level encompasses the computer hardware of the organization, network interface, telecommunication facilities and the LANs that support the intranet and extranet. Previously systems in organizations used to be monolithic and centralized but now they are more decentralized and distributed in the form of client/server, network-based computer systems etc.
Information level: This level is concerned with the information of the organization like databases, model bases, knowledge bases and metabases. This ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Enterprise Information Architecture Essay Example | Topics and Well Written Essays - 4750 words”, n.d.)
Retrieved from https://studentshare.org/miscellaneous/1504530-enterprise-information-architecture
(Enterprise Information Architecture Essay Example | Topics and Well Written Essays - 4750 Words)
https://studentshare.org/miscellaneous/1504530-enterprise-information-architecture.
“Enterprise Information Architecture Essay Example | Topics and Well Written Essays - 4750 Words”, n.d. https://studentshare.org/miscellaneous/1504530-enterprise-information-architecture.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Enterprise Information Architecture

Implementation of Enterprise Architecture

...? Implementation of Enterprise Architecture Introduction Implementing enterprise architecture is carried out through a number of architectural frameworks. These include enterprise business architecture, enterprise information architecture, enterprise applications architecture and enterprise technology architecture. Information architecture in most cases is executed under the business architecture (Bernus, Nemes & Schmidt, 2003). Enterprise Business Architecture Enterprise business architecture involves a portrayal of the processes, entities and functions on a business scale. In addition, business architecture acts as a foundation for the organization in aspects relating to missions and vision of the organization. Furthermore, business...
3 Pages(750 words)Research Paper

Enterprise Architecture

...Enterprise Architecture Introduction The development of enterprise architecture is revolutionizing the business industry. Organizations are adopting this to improve their performance and make their work effective and more efficient. This applies best to very large organization that handle a lot of work volume. This has brought about many complexities for the normal system, mostly because of the different platforms that exist (Saha, 2007). To effectively manage these complexities that come with large volumes of data, the enterprise architecture is implemented. It merges the information system with the business aspect of it. This leads to the significant reduction of operation costs. A case study of an organization that successfully...
2 Pages(500 words)Essay

Enterprise Architecture: Justification

...? Enterprise Architecture: Justification Introduction An enterprise has been defined as a business venture that has recognizable business functions and operations. It is a stand-alone entity that sometimes has other enterprises within it. Architecture is the underlying framework that makes up a system. It is like the skeleton on which a system is developed. Enterprise Architecture is the concept of framework that defines the operations of an organization. The application of this framework is with the overall intention for the organization to achieve its future objectives, and be successful. Information has become a crucial part of most modern enterprises and organizations. It has a direct impact on the activities of a business and all...
3 Pages(750 words)Essay

Enterprise Application Architecture

...? Enterprise application architecture Number: Lecturer: Enterprise application architecture Enterprise information systems architectures have been there for a long time. It is the main reason it has been seen to be growing and new architectures are being developed. Enterprise information systems architectures are a very important in software development because of the way it is shaping the way software are being developed. The professions that have developed this discipline are varied. This paper will evaluate the role that computer science, information systems and library science have contributed to the development of enterprise information systems architectures. These three disciplines have each contributed to the development...
3 Pages(750 words)Research Paper

Enterprise Architecture Final Exam

For the said paradigm of homogeneity to take place in the running of the Enterprise Architecture, it is important to have key deliverables in place. These deliverables are tangible tasks that must be performed to ensure the successful implementation of the company’s operating model (Schekkerman, 2004). There could indeed be as many of these deliverables as possible but classifying them is also possible. Classifications could bring about key deliverables such as road maps, made up of technology, process and people road maps; application portfolio management; IT risk management; standards and polices; and scenario planning may all be mentioned. Enterprise architecture framework is generally a tangible manifestation of the mindset o...
6 Pages(1500 words)Assignment

Enterprise Architecture

....aspx Carraro and Chong provide a detailed description of the Software as a Service model of enterprise architecture. The benefits and considerations for embracing SaaS are discussed. The article sheds light on how SaaS affects information technologies and how to become a SaaS provider. The article is an excellent source of information about SaaS and become the starting point in the analysis of SaaS applications and frameworks. Chase, N. (2006, February 14). Introducing The Open Group Architecture Framework (TOGAF), Part 1: Understand TOGAF and IT architecture in today’s world. Retrieved July 26, 2011, from IBM.com: http://www.ibm.com/developerworks/library/ar-togaf1/ The article is a comprehensive review of the TOGAF framework and its...
12 Pages(3000 words)Essay

Enterprise Architecture Technique

EA allows the business organizations to set objectives and make use of the latest tools and technologies to achieve these objectives. In this scenario, this paper presents a detailed discussion on one of the most useful EA frameworks known as customer relationship management (CRM). This paper will start with a brief overview of enterprise architecture, after that we will discuss customer relationship management. This paper will discuss the latest applications of CRM and new developments in this area. The basic purpose of this research is to show how enterprise architecture helps achieve organizational objectives.
According to Korhonen (2010), enterprise architecture is an important technique to support corporate decision makin...
19 Pages(4750 words)Research Paper

Enterprise Architecture

... International Conference, EAI2N 2010, held as part of WCC 2010, Brisbane, Australia, September 20-23, 2010 proceedings. Berlin: Springer. Giachetti, R. E. (2010). Design of enterprise systems: Theory, architecture, and methods. Boca Raton, Fla: CRC Press. Land, M. (2009). Enterprise architecture: Creating value by informed governance. Berlin: Springer. Raj, P. (2012). Cloud enterprise architecture. Boca Raton, Fla: CRC Press....
1 Pages(250 words)Assignment

Enterprise Architecture Q&A

Enterprise Architecture Q&A Lecturer: Question Possible data entities in a level agency can include HR and corporate activities. The various data dictionary entries for these entities include adding employees, editing employees, adding stores, editing stores and timecard.
Figure 1. ER Diagram
Below is a CRUD matrix for the state-level agency
EMPLOYEE
STORE
TIMECARD
Add Employee
C
Edit Employee
UD
Add Store
C
Edit store
UD
Add Timecard
R
R
C
The establishment of the two possible entities allows development of the various relationships between the entities. After establishing the relationships, CRUD (Create, Read, Update and Delete) matrix helps cross-check the two to ensure co...
1 Pages(250 words)Assignment

Effective Alignment of Information Technology

Considering reports and issues such as privacy regulations, data protection, risk management compliance, project management and governance, information security, business continuity management and effective corporate governance, an effective IT infrastructure seems to be the primary tool for the implementation of practical and strategic solutions. An updated IT infrastructure is important for improving corporate governance and shareholder returns (Kaen 2003; Trites, 2004).
According to the Global Corporate Governance Principles, "Corporate governance" refers to the "relationship among various participants in determining the direction and performance of corporations. The primary participants are (1) the shareholders, (2) the m...
44 Pages(11000 words)Research Proposal

The Widespread Use of Information Communication Technology

An increasing number of frauds is an example of an alarming situation. All these have a far-reaching impact on the employees, on businesses and on people. 

On the work front, the advantages of ICT cannot be overlooked in maintaining and implementing successful quality programs. Customer-driven standards, customer-supplier links, the prevention of error, quality at the source, and continuous improvement are some of the principles that are put into practice (Laudon & Laudon, 2000 cited by Iles & Healy, 2004). IC T facilitates the production process, helps meet benchmarking standards, make constant upgradation based on customer demands. The internet has revolutionized not just the selling of goods and services...
9 Pages(2250 words)Essay

Information Systems Development Process

When a project has an obvious objective to be attained and the effort is very small, common sense and attention to what the client wants can be a suitable alternative to more complicated and formal methods. However, when the software system becomes more complex, the objectives are multiplied and start to depend on different configurations and circumstances, it becomes imperative to structure the development effort to avoid software development that does not answer the clients need, or does not have the requisite level of quality, or becomes impossible to forecast in terms of time and budget – or a combination of any of the preceding.

In situations of complexity in software development, structure methods seek to im...
13 Pages(3250 words)Assignment

Management Information System

At the beginning of the twentieth century, the revolution began in knowledge and information then accelerated gradually thereafter. It became now the foundation for many new services and products wherein 1974 applications pushed the limits of human ability. As an information system, research advanced so did user expectations. And the question raised is how individuals, the organization can adjust in order to leverage the delivery of information technology.

The infrastructure of the information technology (IT) affords the base for an organization to construct its information system needed to complete the work and provide the employee with all the necessary information. However, management decisions regarding IT are very...
12 Pages(3000 words)Assignment

Info-Point: Marketing of New Touch Screen Information Technology

The development of the new Info-Point technology, a stand-alone information module designed to offer the public information on tourism, local shopping, weather, and transportation, has created the opportunity to successfully market these information technologies to different UK cities. The entire marketing concept is to establish self-service information centers that offer a wide variety of regional information, utilizing an easy-to-use touch screen methodology to cater to a broad mass market of consumers. 

Touch screen interface systems are becoming more and more common in the UK and abroad. During a pilot experiment using touch screen information technology, the automotive manufacturer Lexus piloted an informatio...
10 Pages(2500 words)Report

Information Security Management

Security is a group of activities that include the policies, measures, and actions which are utilized to stop unlawful access or alteration, theft, and physical damage to information or computer. Security can be supported by an assortment of techniques and tools to safeguard computer hardware, software communications networks, and data (Laudon & Laudon, 1999, p. 502). In the modern age of information technology, there are many threats happened for organizational information. We need a security model that has the ability to manage and secure our information reserves. Technical administrative safety /security measures like security plans, actions and techniques are the main practices for the organizational information security m...
10 Pages(2500 words)Research Paper

Information Security Policy of Organization

In the modern age of information technology, there are many threats created for organizational information. Organizations need a security model that has the capability to handle and secure our information reserves. Technical administrative safety /security measures like security plans, actions and procedures are the general practices for the organizational information security procedures. The attentiveness of producing actions is concerned by the organizations to an appreciably smaller level, on the other hand at the same time these are weighed up as being further efficient organizational actions than technical administrative ones. Information security encompasses organizational features, officially authorized aspects, institution...
6 Pages(1500 words)Research Paper

Colonial Architecture in Americas

American colonial architecture began during colonial rule in the 17th century. The settlers from various European countries arrived there, dwelled there and brought their own technique of architecture with them. Among them were the British, French, Spanish, Portuguese and German. European architecture became dominating in the Americas. As historians Burkholder and Johnson have pointed out, "in a remarkably short time, the conqueror's cathedrals, convents, administrative buildings, and private residences replaced the pyramids, elevated plazas, ball courts, and palaces of the indigenous elites.” (Mark A. Burkholder and Lyman L. Johnson, 2004) Thus the American architecture can be called amalgamative in its characteristic. But...
22 Pages(5500 words)Assignment

Business Information Systems

...). Business Information Management: Improving Performance Using Information Systems . Essex: Prentice Hall. Laudon, K. C., & Laudon, J. P. (1999). Management Information Systems, Sixth Edition. New Jersey: Prentice Hall . Murray, M. (2009). Introduction to Supply Chain Management. Retrieved October 24, 2009, from About.com: http://logistics.about.com/od/supplychainintroduction/a/into_scm.htm Phill, N. (2007). Enterprise Architecture Modernization Information Technology for the Next Decade. Weber Associates: Sponsored by Sprint Nextel. Prezant, S. (2006). Business Information Systems. Chapter 1 Business Information Systems: An Overview. Shelly, Cashman, & Vermaat. (2005). Discovering Computers 2005. Boston: Thomson Course Technology...
8 Pages(2000 words)Case Study

Global Employee Information and Consultation: Replicating the European Model

A significant step to enhancing the employees’ right to information and consultation is the establishment of the European Works Council (EWC). The EWC Directive (94/45/EC) aims to improve cooperation in transnational companies and to allow trade unions to influence, at least indirectly, the decision-making of corporations (Lockwood and Williams). It requires community-scale undertakings and community-scale groups of undertaking to create this mechanism for regular consultation of the workforce. A ‘community-scale undertaking’ is one with at least 1,000 employees within the Member States and at least 150 employees in each of at least two Member States (Lewis and Sargeant).

An EWC is a forum that would a...
9 Pages(2250 words)Coursework

Enterprise Information Architecture

...ient. Introducing tools that enhance workplace productivity. 5 Corporate Responsibility Having a positive impact on the environment, the society and complying with the industry’s regulations. Compliance with the industry regulations. Works Cited Barros, Alistair, et al. "Processes, roles, and events: UML concepts for enterprise architecture." «UML» 2000—The Unified Modeling Language (2000): 62-77. Lankhorst, Marc. Enterprise architecture at work. Vol. 352. Berlin: Springer, 2009. Mario, G. (2010). The art of enterprise information architecture: a systems-based approach for unlocking business insight. Pearson Education India. Marston, Sean, et al. "Cloud computing—the business perspective." Decision support systems 51.1 (2011):...
6 Pages(1500 words)Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Essay on topic Enterprise Information Architecture for FREE!

Contact Us