Reference no: EM133214204
Mall Bank (MB) is a regional bank with 20 branches that provides a full range of banking services/products. It has a small call centre that can handle complaints and general questions about accounts. The staff in this call centre are allowed to use their own mobile devices such as laptop, mobile phone, or tablet in their work.
The business vision of the bank is to "Be the most loved and trusted national bank in the country"
The CEO is wondering if the current IT infrastructure is good enough to achieve the vision.
- The bank accounting and Customer Relationship Management (CRM) software is outdated.
- The mobile banking app is not as good as other banks'.
- The bank database is stored in a company data centre that has limited capacity.
The CEO would like to ensure the IT infrastructure can cope with the peak demand during busy periods and improve the speed of transaction processing time.
At the same time, the bank has a number of existing systems including HR/payroll, General Ledger, Mortgage repayment, ATM and CRM systems. The CEO is worried that management is not seeing the whole picture of the bank's business.
In addition, he is interested in gaining some insight to the changing patterns in customer use of banking products to target marketing. He would also like to analyse the data to decide which are the most profitable areas to expand into and which should be scaled back.
Therefore, the CEO is asking the IT manager to design an ICT management plan which aligns with the bank vison.
Based on the Scenario above:
Explain how Data Mining could be used to support the CEO goals?
As the IT manager of the business described in the scenario,
- Are you concerned about use of Bring Your Own Device in the bank? And why?
- What is your suggestion on a Mobile Device Management (MDM) for the business?
Similarities and differences of routing and bridging
: Discuss the similarities and differences of routing and bridging. Describe a situation where you would use a bridge and another where you would use a router.
|
Describe risks and mitigations that could be encountered
: Describe the risks and mitigations that could be encountered with each of the seven IT domains when it comes to HIPPA
|
Explain the difference between internal
: If a page is shared between two processes, is it possible that the page is read-only for one processand read-write for the other?Why or why not?
|
Formulate a policy and standards for a small business
: You are asked to formulate a policy and standards for a small business regarding their Wireless and Network Security Policy, including its Encryption Policy
|
Suggestion on mobile device management
: Mall Bank (MB) is a regional bank with 20 branches that provides a full range of banking services/products. It has a small call centre that can handle complaint
|
What are the major or most notable cyber threats
: 1. Building block technologies (what they are, how they are used, give examples) in these three areas: Software Building Blocks, Hardware Building Blocks, Netwo
|
Access the webpage of company
: Alice is working from home and she wants to access her company's computer from home. She needs to access the webpage of her company and also send the email to h
|
Statement of the organization position
: Present Issue Statement, Statement of the Organization's Position, Applicability, Roles and Responsibilities, Compliance, Points of Contact, and Supplementary I
|
What motivates to commit to study double major in psychology
: What motivates you to commit to study DOUBLE MAJOR in Psychology and Management?
|