Using Sprinklr, Nike could have a digital customer profile for each of its customers. Provide two examples of computer security procedures that Nike (or Sprinklr) could use to protect Nike’s customer data from unauthorized disclosure, specific to the last point listed in Table 3.3 “Data should not be disclosed for reasons incompatible with the business objective for which they are collected.

Case answers must be different for each question part.
Clearly label your answer question parts (e.g. A (i), B (ii) ).

(i) link to the specified case using terms specific to the business and functional area under discussion,

(ii) clearly illustrate the concept or theory being addressed or examined using an example and
(iii) differentiate from other theories, by being specific enough that your example could not readily apply to other concepts or theories, i.e. provide enough information to illustrate WHY the example is relevant to the concept or theory being discussed.

Tip: Read all of the questions first, so that you can organize your work to avoid repetition.
Required: (10 marks)
Read IT’s About Business 9.3, Sprinklr, Section 9.4, p. 287
A. (2 marks, one mark for each example)

Provide an example of customer-related information and knowledge that could be present at Nike based upon its use of Sprinklr.
(i) Information example
(ii) Knowledge example

B. (2 marks, one mark for each example)

Using Sprinklr, Nike could have a digital customer profile for each of its customers. Provide two examples of computer security procedures (also known as controls) that Nike (or Sprinklr) could use to protect Nike’s customer data from unauthorized disclosure, specific to the last point listed in Table 3.3 “Data should not be disclosed for reasons incompatible with the business objective for which they are collected.” Include HOW the data could be protected and WHAT data could be protected for each security procedure or control.

WHAT customer data could be protected by WHICH computer security procedure and HOW?
(i) Example 1
(ii) Example 2

C. (3 marks, one mark for each example with explanation)

Explain how each of the following concepts could relate to Nike’s use of Sprinklr.

(i) Master data(ii) Transaction data (iii) Data governance

D. (1 mark, for an example)

Provide an example of an input technology that Nike could use to enter or update its data stored within the Sprinklr application system.

E. (1 mark, for an example)

Provide an example stating which type of secondary storage could be used by Nike and how it would be used to store its customer data.

F. (1 mark, for an example)

Provide an example of how Nike could use on-demand (self-service) utility computing with Sprinklr.

© 2020 EssayQuoll.com. All Rights Reserved. | Disclaimer: For assistance purposes only. These custom papers should be used with proper reference.