Студопедия
Случайная страница | ТОМ-1 | ТОМ-2 | ТОМ-3
АрхитектураБиологияГеографияДругоеИностранные языки
ИнформатикаИсторияКультураЛитератураМатематика
МедицинаМеханикаОбразованиеОхрана трудаПедагогика
ПолитикаПравоПрограммированиеПсихологияРелигия
СоциологияСпортСтроительствоФизикаФилософия
ФинансыХимияЭкологияЭкономикаЭлектроника

I T strategy formulation

Module wise Version Control Chart | FISMM architecture | Uses of the FISMM | FT01.03 - Online gateway for receipt of reports | FT03.03 - Identity resolution software | FD04.01- Detection of high risk individuals and legal entities | FT04.05 - Web mining software | FD05.06 - Collection of information from foreign FIUs | FD06 - Strategic analysis | FT06.01 - Online analytical processing (OLAP) software |


Читайте также:
  1. A STRATEGY TO STRADDLE THE PLANET
  2. American grand strategy and the islamic wars
  3. Analyse the role of MIS in underpinning competitive advantage and developing strategy.
  4. B) In pairs discuss if you agree with the idea that SATs is a good idea. Use the Essential Strategy Language.
  5. B) Service Strategy
  6. Basic Strategy Comes First
  7. CHAPTER I. STRATEGY

15. Information Technology has a significant role in offering critical and fundamental support to all aspects of working of FIU. IT strategic plan improves key stakeholders’ understanding of IT opportunities and limitations, assesses current performance, identifies capacity and human resource requirements, and clarifies the level of investment required. The business strategy and priorities are to be reflected in portfolios and executed by the IT tactical plan(s), which specifies concise objectives, action plans and tasks that are understood and accepted by both business and IT (refer FD14.01 - Define a strategic IT plan). After understanding current IT capabilities, engagement with business and senior management is required to align IT strategic planning with current and future business needs.

16. In case of a newly set up FIU, sample prioritisation scheme for improving maturity is as under:

Phase I (0- 2 years) FD01 - Collection of reports FD02 - Access to information FD05 - Operational analysis FD07 - Domestic cooperation FD08 - International cooperation FD09 - Registration of reporting officer FD10 - Capacity building of reporting entities FD15 - Information security management Phase II (2-5 years) FD06 - Strategic analysis FD11 - Managing compliance of reporting entities Phase III (after 5 years) FD03 - Processing of information FD04 - Detection of new targets FD12 - Performance management FD13 - Information management FD14 - Technical infrastructure management

 

Figure 8 – Sample prioritisation scheme for domains

 


17. FIU may evaluate the business requirements, technological direction and information architecture to prioritise acquisition of technology. Sample prioritisation scheme for acquisition of technology is given below:

Phase I (0- 2 years) Reporting format specification (FT01.01) Report preparation software (FT01.02) Relational database management system (RDBMS) (FT01.04) Direct access to external databases (FT02.02) Connection to ESW/ FIU.NET(EU FIUs) (FT08.01,FT08.02) Website (FT10.01) Phase II (2-5 years) Online gateway (FT01.03, FT09.01) Database integration (FT02.01) Service oriented architecture (FT02.03) Extraction transformation and loading (ETL) software (FT03.01) Data quality software (FT03.02) Identity resolution software (FT03.03, FT04.01) Online analytical processing (OLAP) software (FT04.02, FT05.03, FT06.01) Data mining software (FT04.03, FT06.02) Text mining software (FT04.04) Web mining software (FT04.05) Rule based system (FT05.01, FT11.01) Analyst workbench (FT05.02) Enterprise search software (FT05.04) Open source search engine (FT05.05) Link visualization tool (FT05.06) Report generation tool (FT05.07) Spreadsheet software (FT06.03) Data standards for information exchange (FT07.01) Workflow software (FT12.01) Dashboards and scorecards (FT12.02) Content management system (FT13.01) Enterprise management solution (EMS) (FT14.01) Firewall (FT15.01) Intrusion detection and prevention system (FT15.02) Authentication and authorization system (FT15.03) Antivirus software (FT15.04) Phase III (after 5 years) Geographic information software (FT06.04) Language ware dictionary (FT06.05) Automated access and exchange system (FT07.02) Learning management system (FT10.02) Computer aided audit tool (FT11.02)

 

Figure 9 – Sample prioritisation scheme for acquisition of technology


Дата добавления: 2015-11-14; просмотров: 73 | Нарушение авторских прав


<== предыдущая страница | следующая страница ==>
Performance management| Technology evaluation

mybiblioteka.su - 2015-2024 год. (0.005 сек.)