Suggestion on mobile device management

Assignment Help Basic Computer Science
Reference no: EM133214204

Mall Bank (MB) is a regional bank with 20 branches that provides a full range of banking services/products. It has a small call centre that can handle complaints and general questions about accounts. The staff in this call centre are allowed to use their own mobile devices such as laptop, mobile phone, or tablet in their work.

The business vision of the bank is to "Be the most loved and trusted national bank in the country"

The CEO is wondering if the current IT infrastructure is good enough to achieve the vision.

  • The bank accounting and Customer Relationship Management (CRM) software is outdated.
  • The mobile banking app is not as good as other banks'.
  • The bank database is stored in a company data centre that has limited capacity.

The CEO would like to ensure the IT infrastructure can cope with the peak demand during busy periods and improve the speed of transaction processing time.

At the same time, the bank has a number of existing systems including HR/payroll, General Ledger, Mortgage repayment, ATM and CRM systems. The CEO is worried that management is not seeing the whole picture of the bank's business.

In addition, he is interested in gaining some insight to the changing patterns in customer use of banking products to target marketing. He would also like to analyse the data to decide which are the most profitable areas to expand into and which should be scaled back.

Therefore, the CEO is asking the IT manager to design an ICT management plan which aligns with the bank vison.

Based on the Scenario above:

Explain how Data Mining could be used to support the CEO goals?

As the IT manager of the business described in the scenario,

  1. Are you concerned about use of Bring Your Own Device in the bank? And why?
  2. What is your suggestion on a Mobile Device Management (MDM) for the business?

Reference no: EM133214204

Questions Cloud

Similarities and differences of routing and bridging : Discuss the similarities and differences of routing and bridging. Describe a situation where you would use a bridge and another where you would use a router.
Describe risks and mitigations that could be encountered : Describe the risks and mitigations that could be encountered with each of the seven IT domains when it comes to HIPPA
Explain the difference between internal : If a page is shared between two processes, is it possible that the page is read-only for one processand read-write for the other?Why or why not?
Formulate a policy and standards for a small business : You are asked to formulate a policy and standards for a small business regarding their Wireless and Network Security Policy, including its Encryption Policy
Suggestion on mobile device management : Mall Bank (MB) is a regional bank with 20 branches that provides a full range of banking services/products. It has a small call centre that can handle complaint
What are the major or most notable cyber threats : 1. Building block technologies (what they are, how they are used, give examples) in these three areas: Software Building Blocks, Hardware Building Blocks, Netwo
Access the webpage of company : Alice is working from home and she wants to access her company's computer from home. She needs to access the webpage of her company and also send the email to h
Statement of the organization position : Present Issue Statement, Statement of the Organization's Position, Applicability, Roles and Responsibilities, Compliance, Points of Contact, and Supplementary I
What motivates to commit to study double major in psychology : What motivates you to commit to study DOUBLE MAJOR in Psychology and Management?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Test your algorithms with a desk check

Test your algorithms with a desk check using the appropriate test values for each variable required by your design. Provide a list of the variables and the values that the variables can hold.

  List three debugging methods within the debugger which can

list three debugging techniques within the debugger that can be used to locate logical error in the java code. for each

  Enterprise risk management framework

What are baseline security requirements that should be applied to the design and implementation of applications, databases, systems, network infrastructure,

  Continuum of very mature to cutting edge technology

How can the organization decide where along the continuum of very mature to cutting edge technology it belongs in its IT acquisition strategy?

  Enterprise resource planning systems

Enterprise Resource Planning (ERP) systems are used to plan and control important day-to-day operations.

  Associated linear demand and supply functions

At what price should the chias be marked so that there is neither a surplus nor a shortage of chias?

  What are the pros and cons of encouraging development

When privatization picked up pace in Poland, some analysts warned that effective privatization first required more developed domestic financial institutions. Comment ? What are the pros and cons of encouraging the development of stock markets in d..

  Explain nested join

Explain Nested Join, Hash Join, and Merge Join in SQL Query Plan.

  Define risk

Create an introductory section where you clearly DEFINE RISK. Research and Pick ONE organization that can you conduct a risk assessment on.

  How much decrease in voter support for candidacy

A week later it became known that he had had an extramarital affair, and a new poll showed only 51% of 1010 voters supporting him.

  Explain the concept of globalization

Explain the concept of globalization and the role information technology has in the global market.

  Determine the required length of the parabolic collector

If solar energy is transferred to water at a net rate of 400 Btu/h per ft length of the tube, determine the required length of the parabolic collector to meet the hotwater requirements of this house.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd