Free Essay

Gartners Hype Cycle

In:

Submitted By 2569
Words 1983
Pages 8
Research
Publication Date: 5 August 2005 ID Number: G00130115

Gartner's Hype Cycle Special Report for 2005
Jackie Fenn, Alexander Linden

This year, we celebrate the 10th anniversary of Gartner's Hype Cycles. More than 1,600 information technologies and trends across 68 markets, regions and industries are evaluated in the most comprehensive assessment of technology maturity in the IT industry.

© 2005 Gartner, Inc. and/or its Affiliates. All Rights Reserved. Reproduction of this publication in any form without prior written permission is forbidden. The information contained herein has been obtained from sources believed to be reliable. Gartner disclaims all warranties as to the accuracy, completeness or adequacy of such information. Although Gartner's research may discuss legal issues related to the information technology business, Gartner does not provide legal advice or services and its research should not be construed or used as such. Gartner shall have no liability for errors, omissions or inadequacies in the information contained herein or for interpretations thereof. The opinions expressed herein are subject to change without notice.

ANALYSIS
Gartner's Hype Cycles highlight the relative maturity of technologies across a wide range of IT domains, targeting different IT roles and responsibilities. Each Hype Cycle provides a snapshot of the position of technologies relative to a market, region or industry, identifying which technologies are hyped, which are suffering the inevitable disillusionment and which are stable enough to allow for a reasonable understanding of when and how to use them appropriately (see "Understanding Gartner's Hype Cycles, 2005"). Ten years ago, Gartner introduced the idea of the Hype Cycle as a commentary on the common pattern of human response to technology (see Figure 1 and "When to Leap on the Hype Cycle"). Something about the pattern resonated deeply with technology planners, and Gartner received requests the following year for an update. Every year since, Gartner has published an Emerging Technologies Hype Cycle and applied the model to an ever-increasing number of IT and business domains. Figure 1. First Hype Cycle for Emerging Technologies, 1995
Peak of Inflated Expectations Intelligent Agents Technology Trigger Information Superhighway Virtual Reality Wireless Communications Trough of Video Disillusionment Conferencing Handwriting Recognition Plateau of Productivity Slope of Enlightenment Speech Recognition Object-oriented Programming Recommended adoption time frame* Knowledge-based Systems

Visibility

Emergent Computation Type A

Type B

Type C

Time * The recommended adoption time frame may be swayed in either direction for a technology with a particularly high or low level of potential impact within an organization. For example, a Type B company may wait until the Plateau of Productivity to invest in a technology that will result in only marginal efficiency improvements. On the other hand, a Type C company may be prepared to weather some of the learning experiences of the Slope of Enlightenment for a technology that will have a major impact on its core business processes.
Source: Gartner (January 2005)

The technologies on the 1995 Hype Cycle have evolved; wireless communications have exploded into hundreds of underlying technologies, standards and applications, and the information superhighway has manifested itself through the Internet and World Wide Web to drive ubiquitous information access, new forms of community and whole industries built around online commerce. Some technologies didn't fare so well; videoconferencing, handwriting recognition and speech recognition are still featured 10 years later on the 2005 Emerging Technologies Hype Cycle as they struggle toward mainstream adoption (see Figure 2 and "Hype Cycle for Emerging Technologies, 2005").

Publication Date: 5 August 2005/ID Number: G00130115 © 2005 Gartner, Inc. and/or its Affiliates. All Rights Reserved.

Page 2 of 7

Figure 2. Hype Cycle for Emerging Technologies, 2005

visibility
P2P VoIP

Biometric Identity Documents BPM Suites Desktop Search

Inkjet Manufacturing Electronic Ink/Digital Paper Model-Driven Approaches Carbon Nanotubes Podcasting Text Mining Augmented Reality Business Process Networks Grid Computing

Linux on Desktop for Mainstream Business Users Micro Fuel Cells

Really Simple Syndication Biometric User Identification Corporate Blogging Speech Recognition for Telephony and Call Center

Internal Web Services

802.16 2004 WiMAX VoIP Organic Light-Emitting Devices Corporate Business Rule Semantic Web Mesh Networks — Sensor Web-ServicesEngines Enabled Business Trusted Location-Aware Applications 4G Models Computing Group Software as Service/ASP SOA Handwriting Recognition Prediction Markets Videoconferencing Networked Collective Intelligence RFID (Passive) Quantum Computing Wikis DNA Logic XBRL Tablet PC Internet Micropayments

Text-toSpeech/ Speech Synthesis

As of August 2005

Technology Trigger

Peak of Inflated Expectations

Trough of Disillusionment

Slope of Enlightenment

Plateau of Productivity

maturity
Plateau will be reached in: less than 2 years
Acronym Key 4G ASP BPM P2P RFID fourth generation application service provider business process management peer to peer radio frequency identification SOA VoIP WiMAX XBRL service-oriented architecture voice over Internet Protocol Worldwide Interoperability for Microwave Access Extensible Business Reporting Language

2 to 5 years

5 to 10 years

more than 10 years

obsolete before plateau

Source: Gartner (August 2005)

Although the specific technologies change over the years, the Hype Cycle's underlying message endures: Don't invest in a technology just because it is being hyped or ignore a technology just because it is not living up to early overexpectations. Be selectively aggressive — identify which technologies could be beneficial to your business, and evaluate them earlier in the Hype Cycle. For technologies that will have a lower impact on your business, let others learn the difficult lessons, and adopt the technologies when they are more mature. This year, the Hype Cycle Special Report contains 68 Hype Cycles published in four sets: Communications and IT Services; Infrastructure and Operations; Software and Applications; and Regions and Vertical Sectors.

Publication Date: 5 August 2005/ID Number: G00130115 © 2005 Gartner, Inc. and/or its Affiliates. All Rights Reserved.

Page 3 of 7

Communications and IT Services Communications and IT Services Hype Cycles present the evolving worlds of wired and wireless networking, call center and speech technologies, and the latest assessment of the IT services market, with its frenzy to deliver globally across the spectrum of IT and business process services. Wireless technologies in particular continue to evolve rapidly, including an ongoing proliferation of 802.11 standards and a level of development of software and services that outpaces that of the underlying hardware. In addition, confidence is returning to the broader communications and networking sector, with greater investment by vendors for product differentiation, resulting in accelerated technology advancements: • • • • • • • • "Hype Cycle for Contact Center Infrastructure, 2005" "Hype Cycle for Enterprise Speech Technologies, 2005" "Hype Cycle for IT Services, 2005" "Hype Cycle for Networking and Communications, 2005" "Hype Cycle for Network Service Provider Infrastructure, 2005" "Hype Cycle for Telecommunications, 2005" "Hype Cycle for Wireless Hardware, Software and Services, 2005" "Hype Cycle for Wireless Networking, 2005"

Infrastructure and Operations Infrastructure and Operations Hype Cycles include hardware, operating systems and key infrastructure technologies, as well as infrastructure management issues. This year's set of Hype Cycles show how a growing focus on a key topic can gives rise to a rapid expansion of technologies, standards and applications. The recent explosion of interest in security means that the Information Security Hype Cycle is now joined by drill-down Hype Cycles on data security, biometrics, identity access management, infrastructure protection and vulnerability management: • • • • • • • • • • "Hype Cycle for the Uses of Biometric Technologies, 2005" "Hype Cycle for Data Security, 2005" "Hype Cycle for Human-Computer Interaction, 2005" "Hype Cycle for Identity and Access Management Technologies, 2005" "Hype Cycle for Information Security, 2005" "Hype Cycle for Infrastructure Protection, 2005" "Hype Cycle for IT Operations Management, 2005" "Hype Cycle for Linux, 2005" "Hype Cycle for Open-Source Software, 2005" "Hype Cycle for PC Technologies, 2005"
Page 4 of 7

Publication Date: 5 August 2005/ID Number: G00130115 © 2005 Gartner, Inc. and/or its Affiliates. All Rights Reserved.

• • • • • •

"Hype Cycle for Printing Markets and Management, 2005" "Hype Cycle for Semiconductors, 2005" "Hype Cycle for Server Technologies, 2005" "Hype Cycle for Storage Software Technologies, 2005" "Hype Cycle for Storage Technologies, 2005" "Hype Cycle for Vulnerability Management, 2005"

Software and Applications Software and Applications Hype Cycles span the core IT domains of application development, integration and architecture, through portals and workplace technologies, and into business applications such as customer relationship management and supply chain management. At this point of industry evolution, business application innovation is critically dependent on innovative infrastructure technologies, and the Business Application Technologies Hype Cycle reflects the impact, penetration and maturity of such technologies in this context. Other Hype Cycles demonstrate how technologies such as radio frequency identification have expanded in scope enough to warrant their own Hype Cycles, which cover a range of subtechnologies and applications: • • • • • • • • • • • • • • • • • "Hype Cycle for Application Development, 2005" "Hype Cycle for Application Integration and Platform Middleware, 2005" "Hype Cycle for B2B CRM Technologies, 2005" "Hype Cycle for B2C CRM Technologies, 2005" "Hype Cycle for Business Application Technologies, 2005" "Hype Cycle for Business-Centric Supply Chain Management, 2005" "Hype Cycle for Business Intelligence and Data Warehousing, 2005" "Hype Cycle for Collaboration and Communication, 2005" "Hype Cycle for Content Management, 2005" "Hype Cycle for Corporate Performance Management, 2005" "Hype Cycle for CRM Customer Service and Support, 2005" "Hype Cycle for CRM Marketing Applications, 2005" "Hype Cycle for CRM Sales, 2005" "Hype Cycle for E-Learning, 2005" "Hype Cycle for Enterprise Asset Management, 2005" "Hype Cycle for the High-Performance Workplace, 2005" "Hype Cycle for Portal Ecosystems, 2005"

Publication Date: 5 August 2005/ID Number: G00130115 © 2005 Gartner, Inc. and/or its Affiliates. All Rights Reserved.

Page 5 of 7

• • •

"Hype Cycle for Radio Frequency Identification, 2005" "Hype Cycle for Web Services, 2005" "Hype Cycle for XML Technologies, 2005"

Regions and Vertical Sectors Regional Hype Cycles address the significant disparity of technology adoption across geographic regions. Many technologies depend on the existence of an ecosystem that develops differently around the world. User adoption and needs can differ because of political, cultural and financial factors. Vertical-Sector Hype Cycles reflect the status of technologies in a particular industry. Similar to regions, different industries have varying business needs. Thus, the positioning of technologies may well be different on an industry Hype Cycle — earlier or later, or maturing faster or slower — than on a Hype Cycle that offers a generic, cross-industry perspective. These Hype Cycles also include technologies and trends specific to an industry that do not appear on other Hype Cycles. Regions • • • • "Hype Cycle for Emerging Technologies in China, 2005" "Hype Cycle for Emerging Technologies in India, 2005" "Hype Cycle for Emerging Technologies in Japan, 2005" "Hype Cycle for Emerging Technologies in Latin America, 2005"

Vertical Sectors • • • • • • • • • • • • • • "Hype Cycle for Automotive Electronics, 2005" "Hype Cycle for the Automotive Industry, 2005" "Hype Cycle for the Banking Industry, 2005" "Hype Cycle for Consumer Goods, 2005" "Hype Cycle for Consumer Technologies, 2005" "Hype Cycle for Government, 2005" "Hype Cycle for Healthcare Payers, 2005" "Hype Cycle for Healthcare Provider Applications and Systems, 2005" "Hype Cycle for Healthcare Provider Technologies, 2005" "Hype Cycle for Investment Services, 2005" "Hype Cycle for Life Sciences, 2005" "Hype Cycle for Manufacturing, 2005" "Hype Cycle for the Media Industry, 2005" "Hype Cycle for the Oil and Gas Industry, 2005"

Publication Date: 5 August 2005/ID Number: G00130115 © 2005 Gartner, Inc. and/or its Affiliates. All Rights Reserved.

Page 6 of 7

• • • • •

"Hype Cycle for Product Life Cycle Management, 2005" "Hype Cycle for Retail Technologies, 2005" "Hype Cycle for Transportation, 2005" "Hype Cycle for Utility Industry Applications and Business Processes, 2005" "Hype Cycle for Utility Industry Technologies, 2005"

REGIONAL HEADQUARTERS
Corporate Headquarters 56 Top Gallant Road Stamford, CT 06902-7700 U.S.A. +1 203 964 0096 European Headquarters Tamesis The Glanty Egham Surrey, TW20 9AW UNITED KINGDOM +44 1784 431611 Asia/Pacific Headquarters Level 7, 40 Miller Street North Sydney New South Wales 2060 AUSTRALIA +61 2 9459 4600 Latin America Headquarters Av. das Nações Unidas 12.551 9 andar—WTC 04578-903 São Paulo SP BRAZIL +55 11 3443 1509

Publication Date: 5 August 2005/ID Number: G00130115 © 2005 Gartner, Inc. and/or its Affiliates. All Rights Reserved.

Page 7 of 7

Similar Documents

Free Essay

Full Text

...Gartner's 2012 Hype Cycle for Emerging Technologies Identifies "Tipping Point" Technologies That Will Unlock Long-Awaited Technology Scenarios 2012 Hype Cycle Special Report Evaluates the Maturity of More Than 1,900 Technologies Big data, 3D printing, activity streams, Internet TV, Near Field Communication (NFC) payment, cloud computing and media tablets are some of the fastest-moving technologies identified in Gartner Inc.'s 2012 Hype Cycle for Emerging Technologies. Gartner analysts said that these technologies have moved noticeably along the Hype Cycle since 2011, while consumerization is now expected to reach the Plateau of Productivity in two to five years, down from five to 10 years in 2011. Bring your own device (BYOD), 3D printing and social analytics are some of the technologies identified at the Peak of Inflated Expectations in this year's Emerging Technologies Hype Cycle (see Figure 1). Gartner's 2012 Hype Cycle Special Report provides strategists and planners with an assessment of the maturity, business benefit and future direction of more than 1,900 technologies, grouped into 92 areas. New Hype Cycles this year include big data, the Internet of Things, in-memory computing and strategic business capabilities. The Hype Cycle graphic has been used by Gartner since 1995 to highlight the common pattern of overenthusiasm, disillusionment and eventual realism that accompanies each new technology and innovation. The Hype Cycle Special Report is updated annually to track technologies...

Words: 1510 - Pages: 7

Premium Essay

E Business Principles

...ANSWER SHEET Course Code: | | Course Title: | | Student ID: | | Name: | | Location: | | Task 1: As a consultant, decide to use a a systematic approach to help Spinneys – the famous retail chain to expand their customer outreach in Dubai in line with the 3 directions given by Spinneys. 50 marks. Spinneys is a super-market chain in the Middle East which began as railway provision merchants in 1924, and expanded to a grocery firm importing British Empire goods to the Mandate Palestine. Spinneys’ Dubai chapter started in1961, with the first super-market opening in Al-Nasr Square in 1962. Today it operates multiple supermarkets in the Middle East. 1 The task entails proposing Spinneys to launch a non-typical online delivery model to expand customers outreach in Dubai by utilizing the time people spend in metro stations, bus stops and similar places to order products from the store via QR-Code technology or any other suitable technology in those lines. The first constraint laid out by Spinneys is to utilize the time people spend while waiting at metro stations, bus-stops and other waiting times to order online which they could implement was through online shopping facility. The second constraint was to use QR codes for this initiative and the third constraint was that they did not want to invest in own data centers for any computing requirements. My proposal in line with this constraint would be to provide 1. e-koisk with touch screen at metro stations...

Words: 1934 - Pages: 8

Free Essay

Virtualization and Cloud Computing

...hossain Flash Research Assignment MIS 2501-002 Date: 02/25/2013 Virtualization and Cloud Computing As CTA of our growing manufacturing company, I believe there are considerable opportunities for savings by utilizing virtualization to consolidate server workloads. If we utilize virtualization, we could save up to 11,500,000 dollars in server costs after three years. The costs of our current servers are too high but, using virtualization, our company would benefit by reducing costs and the number of servers. Virtualization is the abstraction of IT resources, such as servers, that masks the physical nature and boundaries of those resources from resource user. Abstraction enables better flexibility, which enables better efficiency. An example of this would be through consolidation. If our company were to consolidate server workloads, instead of having 1000 servers in our datacenter, we would have 10 physical servers in one virtual machine server. This would come to a total of 100 virtual machine servers, instead of the 1000 that we currently run on. Even though the costs of these higher end servers are greater, we would still greatly benefit. To a provider, virtualization creates the flexibility to deliver resources to meet service needs in very flexible, elastic, rapidly changing manner. Virtualization makes it easier for IT to deliver IT capabilities faster, to have a lower barrier to access IT capabilities, and to deliver exactly the right amount of resources needed. Virtual...

Words: 515 - Pages: 3

Free Essay

Enterprise Architecture

...I believe the one technology that could have the greatest impact on enterprise architecture in U.S. corporations by 2023 is cloud computing. As indicated on the hype cycle for emerging technologies in 2013, it currently is in the trough of disillusionment; however, I believe that cloud computing will bring about the most change to enterprise architecture by 2023. Cloud computing will have the ability to bring enterprise architecture a step forward and redefine the way businesses will support their architecture. As cloud computing evolves, as will enterprise architecture in the way that advanced concepts and practices will eventually be deemed as government requirements. By 2023, I anticipate that most, if not all, companies will be using a cloud platform where it will be used on multiple devices – this brings attention to EA as it will make it more challenging to standardized personal devices. BYOD will become a more relevant option with increased capabilities, like scalability and using software as a service through the cloud, impacting the way EA is integrated in an organization. The shift in enterprise architecture will also stem from the control needed from cloud computing. Currently, when companies move to cloud computing, they are essentially handing control over the design parameters of the enterprise. As a result, the role of the enterprise architect will become obsolete as the responsibilities were to build and maintain a stable model for the business. The...

Words: 382 - Pages: 2

Premium Essay

Philip K. Dick's The Minority Reports

...behavior. Machine Learning, at the heart of it, works on this very premise. All the data in the world is of little use if are unable to devise a way to extract meaningful information from it, which can aid us making effective and efficient decisions. Machine Learning is what facilitates this, and it is for this very reason that Gartner, a leading market and technology research firm, has replaced Big Data with Machine Learning in its 2015 Hype Cycle Report of Emerging Technologies. Gartner's Hype Cycle, introduced in 1995, characterizes the typical progression of innovation, from overenthusiasm through a period of disillusionment to an eventual understanding of the innovation's relevance and its role in a market or domain. The Hype Cycle is a graphical depiction of a common pattern that arises with each new technology or innovation. Hype Cycles help technology planners to decide when to invest in a technology. They are important for organizations deciding which new technologies to adopt and when, and what actions should be taken by strategic and technology planners based on their knowledge of the Hype Cycle. If one observes the 2014 and 2015 Hype Cycles closely, it will not escape notice that not only has Machine Learning replaced Big Data, it has also been included in the ‘Peak of Inflated Expectations’ region, which signifies that the expectations of Machine Learning will rise above the current reality of its capabilities. In the light of such revelations, it is perhaps wise...

Words: 1614 - Pages: 7

Premium Essay

Information System Dissertation

...Information Systems Dissertation The Impact of Cloud Computing on Small and Medium Sized Enterprises. Word Count: 12,497 Abstract In recent years a new computing paradigm has emerged: Cloud Computing. Whilst there seem to be an endless number of definitions for this new term, including one by the National Institute of Standards and Technology (NIST) that is nearly 800 words long, nobody seems to be able to settle on a true characterisation of the subject matter. In its simplest form cloud computing can be described as IT-as-a-service. Instead of building your own IT infrastructure to host databases or software, a third party hosts them on their own servers. Companies have access to their data and software over the internet (which in most diagrams is depicted as a cloud). However, is this new paradigm simply a new term for something we are already doing or is it truly going to change the future of IT as we know it? This dissertation investigates the phenomenon commonly known as cloud computing, focussing closely on its impact on small and medium sized enterprises (SME’s), and ultimately attempts to assess the future of cloud computing. The research throughout this paper is based solely on secondary research. No primary research into the topic area has been made. In order to gain a broad view and understanding of the topic various existing papers and studies, on the topic of cloud computing and technology adoption within SME’s, have been studied and critiqued...

Words: 18031 - Pages: 73

Free Essay

On Line Community for Collaboration

...1. Introduction In order to gain a competitive edge an organisations should continuously adopt technologies that would ensure that the company is always ahead of its competitors. Technology, especially in the field of Information technology is changing at a rapid rate. The challenge that most organisations are facing is whether to adopt new technology that hasn’t been proven or adopt technology that has been proven as a success. Both of them have risks linked to them. Adopting unproven technology there is a risk loss of money in the event that the technology is a failure but if technology is a success it might give the company a competitive edge. Adopting a proven technology there is less risk of the company losing money but competitors would have taken advantage of that technology already. Cost is also a factor that needs to be taken before the company could adopt a certain technology; cost benefit analysis should be done. In the report the following topics will be discussed: * The new trends in software and service distribution * Social networking tools * Virtual reality * Biometrics * The new trends in networking and * Nanotechnology The report aims to advice Eskom on what actions should be taken with regards to the above technologies. Eskom is a state owned utility that supplies about 95% of electricity in South Africa. The company owns massive assets such as power stations (coal fired, nuclear, hydro, pump storage and wind turbines), transmission...

Words: 4362 - Pages: 18

Premium Essay

A Reflective Review of Disruptive Innovation Theoryijmr

...A strategic approach to disruptive technologies 1 A strategic approach to disruptive technologies Disruptive change requires new strategies. When conditions change rapidly, organisations find their former approaches which have led to success in the past, are no longer effective. It can be hard to let go of these approaches if they have been a source of competitive advantage. This leads many managers to assume that successful responses to disruptive change are a matter of luck. But it is possible to craft strategies to best exploit opportunities ahead of the competition. Disruptive technologies/ disruptive innovations Harvard professor Clay Christensen coined the term disruptive technology, which he later renamed disruptive innovation. He identified that it was not the technology itself which was disruptive, but its impact on strategy or business models. Christensen’s theory developed the previous body of literature about discontinuity of organisational change. In summary: 1. A disruptive technology emerges. Initially it cannot match the performance of the existing dominant technology, on the factors which customers traditionally value. 2. The distinctive features of the disruptive technology are valued by a small fringe segment of customers, and increasing numbers of new customers. It is also typically cheaper, simpler, smaller or more convenient. 3. Incumbent players in the market conclude that investment in the disruptive technology is irrational, since their most...

Words: 1351 - Pages: 6

Free Essay

Case Analysis

...Consumer 3D Printing | | | | | Index SR.NO. | TITLE | PAGE NO. | 1 | What is 3D Printing? | 3 | 2 | History of 3D Printing | 3 | 3 | 3D Printing and Gartner Hype Cycle | 4 | 4 | 3D Printing Today | 4 | 5 | Impact of 3D Printing | 6 | 6 | Achilles’ heel of 3D Printing | 7 | 7 | Future of 3D Printing | 7 | Consumer 3D Printing “3D printing has the potential to change everything” * Former Ship Engineer What is 3D Printing? The process of making a three-dimensional solid object of virtually any shape from a digital model is 3D printing. It is also known as Additive manufacturing. Using an additive process successive layers of material are laid down in different shapes. 3D printing is different from traditional machining techniques, which mostly rely on the removal of material by methods such as cutting or drilling (subtractive processes). A materials printer usually performs 3D printing processes using digital technology. 3D Printers have evolved to make a variety of objects using a laser or extruder (the material output part of the printer, best described as a futuristic hot glue gun) that move along an X, Y and Z axis to build an object in three dimensions, layer by layer, sometimes only microns thick at a time, depending on the desired resolution of the object. History of 3D Printing This technology was called Rapid Manufacturing; a term coined by inventor S. Scott Crump who founded Stratasys in the late 1980′s. During the...

Words: 944 - Pages: 4

Premium Essay

Technology Management

...Technology Management is set of management disciplines that allows organizations to manage their technological fundamentals to create competitive advantage. Typical concepts used in technology management are technology strategy (a logic or role of technology in organization), technology forecasting (identification of possible relevant technologies for the organization, possibly through technology scouting), technology roadmapping (mapping technologies to business and market needs), technology project portfolio ( a set of projects under development) and technology portfolio (a set of technologies in use). The role of the technology management function in an organization is to understand the value of certain technology for the organization. Continuous development of technology is valuable as long as there is a value for the customer and therefore the technology management function in an organization should be able to argue when to invest on technology development and when to withdraw. Technology Management can also be defined as the integrated planning, design, optimization, operation and control of technological products, processes and services, a better definition would be the management of the use of technology for human advantage. The Association of Technology, Management, and Applied Engineering defines Technology Management as the field concerned with the supervision of personnel across the technical spectrum and a wide variety of complex technological systems. Technology...

Words: 474 - Pages: 2

Premium Essay

Erp Security Management

...Anthony Wataka Accounting Information Systems Information Security Management within ERP Systems Research Paper Introduction This paper will discuss research on Information Security Management (ISM) within Enterprise Resource Planning (ERP) Systems since information security continues to be a hot topic in the business world. The major focus of the paper will be threefold: an analysis of the ERP systems in the present day, a relation of these systems to the accounting and auditing world, and finally, the future of the technology, given its vast impact in the business world. Notable ERP Systems Research Key research pertinent to this paper includes the works of Grabski et al. (2011) who discuss various issues relating to the security environment, as regards the ERP systems. They talk about the risk associated with ERP systems implementation and define it as a “problem that has not occurred but has the potential to cause loss” (Grabski et al. 2011, p. 55). They mention that there is a need for ERP audit techniques, such as embedded audit modules, to control security risks (2011, p.55). This paper will utilize their research work to analyze auditing in an ERP environment by examining security risks and internal controls after ERP implementation. Additionally, Hunton et al. (2004) try to address the issue of risk associated with ERP systems, in the context of auditing (p.1-23). Hunton et al. (2004) analyze how financial auditors compare ERP systems related risks to...

Words: 6202 - Pages: 25

Premium Essay

Cloroxbrita

...Table of Contents Executive Summary ....................................................................................................................... 5 1. Introduction ............................................................................................................................... 7 1.1 Why is an Australian Government Cloud Computing Strategy required? .......................... 7 1.2 Objective .............................................................................................................................. 9 1.3 Audience .............................................................................................................................. 9 2. What is Cloud Computing? ...................................................................................................... 10 2.1 Types of Cloud Computing................................................................................................. 12 2.2 Cloud Service Capability .................................................................................................... 13 3. Potential Risks and Issues of Cloud Computing ...................................................................... 14 4. Potential Business Benefits of Cloud Computing for Australian Government Agencies ........ 17 5. Potential Opportunities of Cloud Computing for Australian Government Agencies .............. 19 6. Australian Government Cloud Computing Policy .......................................

Words: 801 - Pages: 4

Premium Essay

My Name

...CLOUD TECHNOLOGIES TO APPLY IN COUNTRYPAL INTRODUCTION CLOUD/WEB PLATFORM Cloud computing offers business owners like countrypal an opportunity to take their businesses to the next level without having to invest heavily. The entire foundation of cloud computing is based on Iaas or Infrastructure as a Service, which extensively deals with providing the hardware in a cloud. This includes servers, routers, network equipment, firewall etc. However, all this hardware is of no use without a platform to help developers develop their applications, based on which the businesses can actually operate. Cloud computing platforms, which are otherwise known as Platform as a Service (PaaS), are therefore the middle level of cloud computing, which is extremely important for businesses to utilize the infrastructure and software that are available in the cloud. In order to make the most out of cloud computing platforms, irrespective of whether you are a business owner or a developer, it is important to understand the various aspects of this middle layer. Here is a brief overview of this aspect of cloud computing. When a business requires an application to be developed for its use, usually developers invest a lot of money into gathering the requisite infrastructure for its onsite development. But with cloud computing platforms, they can be delivered on the web. So, you can easily develop your applications without investing heavy amounts of money into buying software and other necessary tools for...

Words: 1611 - Pages: 7

Premium Essay

Business Representative

...TRANSVOYANT How to Minimize Supply Chain Risk with Threat Awareness and Thwarting The Situationally Aware Supply Chain™ Strategy Guides www.transvoyant.com How to Minimize Supply Chain Risk with Threat Awareness and Thwarting Table of Contents 2 INTRODUCTION 4 MODIFYING BEHAVIOR 6 OPTIMIZING DATA STREAMS 7 ASSESSING RISK 8 DOD INSIGHT 9 FINAL WORDS www.transvoyant.com 1 How to Minimize Supply Chain Risk with Threat Awareness and Thwarting Introduction to Supply Chain Risk Management Every enterprise must make supply chain risk management one of its core competencies. Yet few understand precisely the extent to which their supply chains are at risk, on which fronts, and least of all, how to address those threats. In fact, most feel far more in control than they are, with a persistent fog preventing visibility into how interdependent key risk variables impact their supply chain. A successful supply chain risk management strategy based on a unified platform is the only way to keep up with shifting risk zones. The platform must be agnostic with respect to point solutions that address specific challenges (e.g., vertical A or geography B), and flexible enough to cross correlate those solutions’ data in a way that drives behavior to minimize supply chain risk and take advantage of supply chain opportunities: • Geographic – terrorism; weather; natural disasters; geopolitical instability; privacy and trade route disruption, among others; ...

Words: 1396 - Pages: 6

Premium Essay

Bpcl

...SPECIAL ISSUE: BUSINESS INTELLIGENCE RESEARCH BUSINESS INTELLIGENCE AND ANALYTICS: FROM BIG DATA TO BIG IMPACT Hsinchun Chen Eller College of Management, University of Arizona, Tucson, AZ 85721 U.S.A. {hchen@eller.arizona.edu} Roger H. L. Chiang Carl H. Lindner College of Business, University of Cincinnati, Cincinnati, OH 45221-0211 U.S.A. {chianghl@ucmail.uc.edu} Veda C. Storey J. Mack Robinson College of Business, Georgia State University, Atlanta, GA 30302-4015 U.S.A. {vstorey@gsu.edu} Business intelligence and analytics (BI&A) has emerged as an important area of study for both practitioners and researchers, reflecting the magnitude and impact of data-related problems to be solved in contemporary business organizations. This introduction to the MIS Quarterly Special Issue on Business Intelligence Research first provides a framework that identifies the evolution, applications, and emerging research areas of BI&A. BI&A 1.0, BI&A 2.0, and BI&A 3.0 are defined and described in terms of their key characteristics and capabilities. Current research in BI&A is analyzed and challenges and opportunities associated with BI&A research and education are identified. We also report a bibliometric study of critical BI&A publications, researchers, and research topics based on more than a decade of related academic and industry publications. Finally, the six articles that comprise this special issue are introduced and characterized in terms of the proposed BI&A research...

Words: 16335 - Pages: 66