Answer To: Page 1 of 6 School of Property, Construction and Project Management — BUSM4619 Information and...
Soumi answered on Jun 15 2021
INFORMATION SYSTEM USAGE: ENTERPRISE MOBILE MANAGEMENT
Table of Contents
Introduction 3
Detailed Description of Enterprise Mobile Management 3
Alignment of Enterprise Mobile Management with Coffee Construction Australia Operations 5
Enterprise Mobile Management in Improving Coffee Construction Australia’s Performance 6
Rationale for the Impact of Enterprise Mobile Management on Project Managers 7
Conclusion 8
References 9
Introduction
The construction business is one of the most profitable and consistently expanding industries in the world and in context of Australia; it is equally relevant, being a major contributor in the GDP of the country. In order to get immune from the increasing competition and increasing demands for high value for money projects in construction business, the need of proper data collection, their storage and processing, leading to accurate strategy formulation and profit potential churning , has led to the increasing use of Information Technology and subsequently the use of Information System (IS). In the given report, the impact of using Enterprise Mobile Management (EMM) on project managers and their management skill have been described and in the context of the chosen organisation, namely Coffee Construction Australia (CCA) has been evaluated, giving an in depth view of information system and its relation with business management.
Detailed Description of Enterprise Mobile Management
Taking note of the benefits of Information and Communication Technology (ICT), its increasing usage in the form of smart mobile devices such as laptops, smartphones, Internet of Things and many more, as well as the benefits of Bring Your Own Devices (BYOD) at workplace has collectively developed Enterprise Mobile Management (EMM). As mentioned by Masuda et al. (2018), in EMM, mobile devices, their users and a fixed system network is used for business purpose-data collection, storage, processing and distribution. The EMM is different from Local Area Networks (LAN), used in business organisations. It is so as in case of LAN, the connection is established by wired transmission lines and the reach is limited to a single organisational facility. On the other hand, in case of EMM, wireless connections are used and the reach of the system remains employee centric, helping business organisations that have temporary or permanent decentralised organisational positioning. As stated by Allen (2019), EMM is capable of securing data used by employees from al potential vulnerabilities and offers high productivity due to its capacity of higher communication and remote accessibility.
EMM has its functions based on four major components – mobile device management, smart application management, mobile content management and users’ authentication management. As explained by Brouillette and Barday (2018), in case of mobile device management (MDM), business organisations focus on the security of the devices that are being granted access to the organisational database. In the initial stage of MDM, the devices used by employees of a chosen organisation, using which an employee wishes to use of organisational data, are enrolled into the system, so that the device owner and the used device can be traced at convenience. Based on the enrolment of the mobile devices in the system, as described by Patel et al. (2018), the project managers secure the data using wireless connectivity, which makes the data less vulnerable and secured.
With the help of MDM, the existing data from any enrolled employee devices can be erased for security purposes. Secondly, as opined by Simpson and Foltz (2018), there is smart application management (SAM), with the help of which business organisational managements control the connectivity and accessibility system provisions of the applications used on mobile devices of their registered employees. They also use software regulations to control access to the system by controlling the applications unlike, MDM, where the devices are controlled by the management for business data security purposes. As assessed by Al-Ani, Alheeti and Jawad (2018), in case organisational employees changing their devices across different mobile platforms, or use different devices at the same time (such as a laptop, smartphone and tablet), smart application management proves to be beneficial.
Thirdly, there is the mobile content management, which makes the management department of business organisation control the nature of the information, made available to the employees, registered under the system. As comprehended by Veljkovic and Budree (2019), the mobile content management (MCM) includes the aspect of data encryption-decryption formats, criteria for system access, the nature of the data, the scope for their offline download, the confidential data viewing authority and device configuration. MCM acts commercially, and it gives access to users, registered in the system, unlike cloud data servers, who give access to any person with the device in which the password is saved. In case of MCM enabled systems, the producing of passwords are required every time a person wants to log into the system and use the available data and information for any business purposes.
Lastly, there is user authentication management (UAM), which ensures that only the user only accesses the system, giving lesser importance to MDM, SAM, MCM, as UAM uses the users biometrics, usage patterns and random password generation process to authenticate the user. As mentioned by Krey (2018), one of the major benefits of using UAM is that even if an employee changes the hardware, the process of registration will not be required and the server of the system would provide the saved data and available data links to the used device only for the time the person is logged into the system.
Alignment of...