Student Solution

-->

"Education is the most powerful weapon which you can use to change the world”
– Nelson Mandela

1 University

1 Course

1 Subject

2.3 Module Review

2.3 Module Review

Q Overview Research Hunt Library's Links to an external site. EAGLEsearch tool can automatically provide proper APA style format for citations and references. ________________________________________ APA Formatting Course-Specific APA Style Instructions and Guidance This Module Review assignment requires you to answer complex questions that are related to the topics presented in the module readings and have been designed to develop your critical thinking skills. Use the course textbook AND outside primary sources to obtain data that support your answers. Follow the guidelines in the Module Review Questions Requirements section, including using current APA style and pasting the questions in bold before each answer. Questions 1. Companies create business records of many types and store the electronic files using an electronic records management (ERM) system. Explain why an ERM is a senior management issue and not simply an IT issue? 2. Describe each of the four V’s of data analytics: variety, volume, velocity, and veracity. 3. Identify the primary functions of a database and a data warehouse. Explain why enterprises need both of these data management technologies. Your document submission is due by the posted due date. Your instructor will use the rubric for evaluating and grading your submission. Save your assignment using a naming convention that includes your first and last name and the activity number (or description). Do not add punctuation or special characters. This assessment aligns with Module Objectives 1, 2, & 3 and Learning Outcomes 1, 3, & 4.

View Related Questions

Solution Preview

ERM is a risk based approach to managing an enterprise developed by the committee of sponsoring organizations of the thread way commissions (COSO). ERM integrates internal control, the Sarbanes-Oxlet Act mandates, and strategic planning. ERM consist of 8 components. Internal environment, object setting, Event Identification, Risk assessment, Risk Response, Control activities, information and communication, and monitoring. ERM is a senior management issue because information security tone makes users aware that insecure practices and mistakes will not be tolerated. Therefore IT security model begins with senior management commitment and support. Senior management is there to implement and maintain security, ethical standards, privacy practices, and internal control. Senior management also enforce how policies and practices should be in order to comply with laws regulations.