Loading

Aligning IS/IT with Business Allows Organizations to Utilize Dark Data
Liyana Shirin Akbar1, Khulood Al-Mutahr2, Mohammed Nazeh3

1Liyana Shirin Akbar, Limkokwing University of Creative Technology, Inovasi Jalan Technocrats, Cyberjaya, Cyberjaya, Selangor, Malaysia.

2Khulood Al-Mutahr, Limkokwing University of Creative Technology, Inovasi Jalan Technocrats, Cyberjaya, Cyberjaya, Selangor, Malaysia.

3Mohammed Nazeh, Limkokwing University of Creative Technology, Inovasi Jalan Technocrats, Cyberjaya, Cyberjaya, Selangor, Malaysia.

Manuscript received on 10 December 2018 | Revised Manuscript received on 17 December 2018 | Manuscript Published on 30 December 2018 | PP: 80-85 | Volume-8 Issue- 2S December 2018 | Retrieval Number: BS2682128218/19©BEIESP

Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open-access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Any data that is left unexplored by an organization is an opportunity lost and a potential security risk says Ganesh Moorthy (2018). This paper discusses about the importance of aligning information system and information technology with business and how that helps organizations to utilize dark data efficiently. Moreover, the types of strategic alignment models and how organizations should adapt those models are also briefly described. The concept of dark data, types of dark data and how organizations can make use of it are further explained in this paper. The impact of dark data and tools to extract dark data is also discussed in this paper. The insights and discussions that are stated in this paper would definitely benefit organizations to understand the importance of aligning the business with IS/IT and make good use of dark data.

Keywords: Information System, Information Technology Dark Data, Strategic Align men Framework.
Scope of the Article: Security Technology and Information Assurance