SlideShare a Scribd company logo
1 of 40
Part II. Data and Network Infrastructure



                                         C hapter 3
                                         Data, Text, and
                                         Document Management



                  M a n a g e m e n t I n fo r m a t i o n S y s te m s
                  EIMBA




Copyright 2012 John Wiley & Sons, Inc.
                                                                                    3-1
Chapter 3 Outline

3.1 Data, Text, and Document Management

3.2 File Management Systems

3.3 Database Management Systems

3.4 Data Warehouses, Data Marts, and Data Centers

3.5 Enterprise Content Management



Copyright 2012 John Wiley & Sons, Inc.
                                                    3-2
Chapter 3 Learning Objectives
    Describe data, text, and document
     management, and their impacts on performance.
    Understand file management systems.
    Understand the functions of databases and
     database management systems.
    Describe the tactical and strategic benefits of data
     warehouses, data marts, and data centers.



Copyright 2012 John Wiley & Sons, Inc.
                                                            3-3
For Class Discussion & Debate
       Wendy's International Relies on Text Mining for
       Customer Experience Management


Scenario for Brainstorming & Discussion (see book for full text)
    1. Select an industry, company, or public sector.
    2. Identify costs due to ignorance about customers’ or
       constituents’ experiences.
    3. Explain how your selection could benefit from text
       analytics that provided feedback within 24 hours.
    4. Compare and assess your answers with others in class.


 Copyright 2012 John Wiley & Sons, Inc.
                                                               3-4
Debate (see book for full text)

       • Select one side of the argument, as described in
         the textbook.
       • Debate whether investments in text message
         collection and mining should be made even if no
         ROI can be determined in advance.
       • Provide convincing arguments either in favor of
         or against the investment in text message
         collection and mining.


Copyright 2012 John Wiley & Sons, Inc.
                                                        3-5
3.1 Data, Text, and Document Management

     Data, text, and documents are strategic assets. Vast
     quantities are:
      • created and collected
      • then stored – often in 5 or more locations
     Data, text, and document management helps
     companies improve productivity by insuring that
     people can find what they need without having to
     conduct a long and difficult search.



Copyright 2012 John Wiley & Sons, Inc.
                                                            3-6
Data Management
Why does data management matter?
  • No enterprise can be effective without high quality data
     that is accessible when needed.
       • Data that’s incomplete or out of context cannot be trusted.
       • Organizations with at least 1,000 knowledge workers lose
         ~ $5.7 million annually in time wasted by employees
         reformatting data as they move among applications.
What is the goal of data management?
  • To provide the infrastructure and tools to transform raw
     data into usable information of the highest quality.



Copyright 2012 John Wiley & Sons, Inc.
                                                                  3-7
Data Management
Why is data management difficult and expensive?
       • Volume of data is increasing exponentially.

       • Data is scattered throughout the organization.

       • Data is created and used offline without going through
         quality control checks.

       • Data may be redundant and out-of-date, creating a huge
         maintenance problem.



Copyright 2012 John Wiley & Sons, Inc.
                                                                  3-8
Data Management
      Current key issues

          Master data management (MDM): Processes to integrate
           data from various sources and enterprise apps in order to
           create a unified view of the data.

          Document management system (DMS): Hardware and
           software to manage, archive, and purge files and other
           electronic documents (e-documents).

          Green computing: Efforts to conserve natural resources
           and reduce effects of computer usage on the
           environment.




Copyright 2012 John Wiley & Sons, Inc.
                                                                       3-9
IT at Work 3.1 – Healthcare Sector
Data Errors Cost Billions of Dollars and Put Lives at Risk

    Every day, healthcare administrators and others throughout
     the healthcare supply chain waste 24% --30% of their time
     correcting data errors.

    Each incorrect transaction costs $60 to $80 to correct.

    About 60% of all invoices among supply chain partners have
     errors, and each invoice error costs $40 to $400 to reconcile.

    Each year, billions of dollars are wasted in the healthcare
     supply chain because of supply chain data disconnects.


Copyright 2012 John Wiley & Sons, Inc.
                                                                   3-10
IT at Work 3.1 (continued)
Data Errors Cost Billions of Dollars and Put Lives at Risk
     Benefits from data synchronization in the healthcare sector
     and supply chair:
      • Easier and faster product sourcing because of accurate
        and consistent item information
       • Significantly reduces the amount of fraud or unauthorized
         purchasing
       • Reduces unnecessary inventories
       • Lowers prices because purchase volumes became
         apparent
       • Improves patient safety

Copyright 2012 John Wiley & Sons, Inc.
                                                                   3-11
Data management is a structured approach for
   capturing, storing, processing, integrating, distributing, securi
   ng, and archiving data effectively throughout their life cycle.




                                         Figure 3.2 Data life cycle


Copyright 2012 John Wiley & Sons, Inc.
                                                                      3-12
Data problems




Copyright 2012 John Wiley & Sons, Inc.
                                         3-13
Data principles

    Principle of diminishing data value. The more
     resent the information, the more valuable it is
    Principle of 90/90 data use: 90% of data is
     seldom accessed after 90 days.
    Principle of data in context. Investment in DM
     infrastructure may be huge.



Copyright 2012 John Wiley & Sons, Inc.
                                                 3-14
IT at Work 3.4

    Check page 69




Copyright 2012 John Wiley & Sons, Inc.
                                         3-15
Transforming data into knowledge

    Text mining and analytics:
       • Exploration
       • Preprocessing
       • Categorizing and modeling




Copyright 2012 John Wiley & Sons, Inc.
                                         3-16
Data from various sources are extracted, transformed, & loaded (ETL) into a data
warehouse; then used to support functions and apps throughout the enterprise.




                  Figure 3.4. Model of an Enterprise Data Warehouse
  Copyright 2012 John Wiley & Sons, Inc.
                                                                            3-17
3.2 File Management Systems
          Computer systems organize data into a hierarchy:
               bits, bytes, fields, records, files, and databases




                     Figure 3.6 Hierarchy of data for a computer-based file.

Copyright 2012 John Wiley & Sons, Inc.
                                                                               3-18
Limitations of the File Environment
    When organizations began using computers, they started with
     one application at a time, usually accounting, billing, and payroll.
     Each app was designed to be a stand-alone system, which led to
     data problems.
    Data problems with a file environment:
      • data redundancy
      • data inconsistency
      • data isolation
      • data security



Copyright 2012 John Wiley & Sons, Inc.
                                                                   3-19
• Stand-alone systems result in data
              redundancy, inconsistency, and isolation.
              •Database management systems helped solve the
              data problems of file-based systems.
Copyright 2012 John Wiley & Sons, Inc.                        3-20
Figure 3.10 Database management system provides access to all data in
    the database.


Copyright 2012 John Wiley & Sons, Inc.                                  3-21
3.3 Database Management Systems (DMBS)

    Numerous data sources
      • clickstream data from Web and e-commerce applications
      • detailed data from POS terminals
      • filtered data from CRM, supply chain, and enterprise
        resource planning applications
    DBMS permits an organization to centralize data, manage
     them efficiently, and give application programs access to the
     stored data.




Copyright 2012 John Wiley & Sons, Inc.
                                                                 3-22
2 types of databases:
a) Centralized database
b) Distributed database with
   complete or partial copies
   of the central database in
   more than one location




  Copyright 2012 John Wiley & Sons, Inc.
                                           3-23
Functions of a Database Management System (DBMS)

    Data filtering and profiling: Inspecting the data for
     errors, inconsistencies, redundancies, and incomplete
     information.
     Data quality: Correcting, standardizing, and verifying the
     integrity of the data.
    Data synchronization: Integrating, matching, or linking data
     from disparate sources.
    Data enrichment: Enhancing data using information from
     internal and external data sources.
    Data maintenance: Checking and controlling data integrity
     over time.
Copyright 2012 John Wiley & Sons, Inc.
                                                                3-24
3.4 Data Warehouses, Data Marts, and
    Data Centers
    Data warehouse: a repository in which data are organized so that
     they can be readily analyzed using methods such as data
     mining, decision support, querying, and other applications.
       • enable managers and knowledge workers to leverage enterprise data to
         make the smartest decisions
       • enable OLAP (online analytic processing)

    Data marts: designed for a strategic business unit (SBU) or a single
     department.

    Data centers: facilities containing mission-critical ISs
     and components that deliver data and IT services to the enterprise.

Copyright 2012 John Wiley & Sons, Inc.
                                                                            3-25
Figure 3.11 Data warehouse framework and views.

Copyright 2012 John Wiley & Sons, Inc.
                                                                 3-26
Characteristics of a data warehouse

    Organization. Data are organized by subject (e.g., by
     customer, vendor, product, price level, and region), and contain
     information relevant for decision support only.
    Consistency. Data in different operational databases may be encoded
     differently. For example, gender data may be encoded 0 and 1 in one
     operational system and “m” and “f” in another. In the warehouse they will
     be coded in a consistent manner.
    Time variant. The data are kept for many years so they can be used for
     trends, forecasting, and comparisons over time.
    Nonvolatile. Once entered into the warehouse, data are not updated.
    Relational. Typically the data warehouse uses a relational structure.
    Client/server. The data warehouse uses the client/server architecture
     mainly to provide the end user an easy access to its data.
    Web-based. Today’s data warehouses are designed to provide an efficient
     computing environment for Web-based applications (Rundensteiner et.
     al., 2000).

Copyright 2012 John Wiley & Sons, Inc.
                                                                           3-27
Copyright 2012 John Wiley & Sons, Inc.
                                         3-28
Building an Enterprise Data Warehouse (EDW)

     A company that is considering building a DW first needs to
     address a series of basic questions to avoid a failure:
      • Does top management support the DW?
      • Do users want access to a broad range of data
      • Do users want data access and analysis tools?
      • Do users understand how to use the DW to solve business
        problems?
      • Does the unit have one or more power users who can
        understand DW technologies?



Copyright 2012 John Wiley & Sons, Inc.
                                                             3-29
Figure 3.12 Teradata Corp.’s EDW
Copyright 2012 John Wiley & Sons, Inc.
                                                                   3-30
Suitability

     Data warehousing is most appropriate for organizations
     that have some of the following characteristics:
    End users need to access large amounts of data
    Operational data are stored in different systems
    The organization serves a large, diverse customer base
    The same data are represented differently in different systems
    Extensive end-user computing is performed


Copyright 2012 John Wiley & Sons, Inc.
                                                                3-31
3.5 Enterprise Content Management

ECM includes:
 electronic document management
 Web content management
 digital asset management, and
 electronic records management (ERM)




Copyright 2012 John Wiley & Sons, Inc.
                                         3-32
Figure 3.13 Electronic records management from creation
             to retention or destruction
Copyright 2012 John Wiley & Sons, Inc.
                                                                       3-33
Unstructured business records
 Businesses generate volumes of documents, messages, and
  memos that, by their nature, contain unstructured content
  that cannot be put into a database.
 Many of these materials are business records that must be
  retained and made available when requested by
  auditors, investigators, the SEC, the IRS, or other authorities.
 To be retrievable, business records must be organized and
  indexed.
 Records are not needed for current operations or
  decisions, are archived—moved into longer-term storage.


Copyright 2012 John Wiley & Sons, Inc.
                                                                 3-34
Business Value of E-Records Management
    Companies need to be prepared to respond to an
     audit, federal investigation, lawsuit, or other legal action
     against it.
       • Examples of lawsuits: patent violations, fraud, product safety
         negligence, theft of intellectual property, breach of contract, wrongful
         termination, harassment, and discrimination

    E-discovery is the process of gathering electronically stored
     information in preparation for trial, legal or regulatory
     investigation, or administrative action as required by law.
       • When a company receives an e-discovery request, the company must
         produce what is requested—or face charges of obstructing justice or
         being in contempt of court.
Copyright 2012 John Wiley & Sons, Inc.
                                                                              3-35
Companies have incurred huge costs for not
responding to e-discovery

    Failure to save e-mails resulted in a $2.75 million fine for
     Phillip Morris.
    Failure to respond to e-discovery requests cost Bank of
     America $10 million in fines.
    Failure to produce backup tapes and deleted e-mails resulted
     in a $29.3 million jury verdict against UBS Warburg in the
     landmark case, Zubulake v. UBS Warburg.




Copyright 2012 John Wiley & Sons, Inc.
                                                                    3-36
Copyright 2012 John Wiley & Sons, Inc.
                                         3-37
Copyright 2012 John Wiley & Sons, Inc.
                                         3-38
Exercise

    Visit Analysis Factory at analysisfactory.com
     Click view the interactive business solution
     dashboards.
    Select one type of dashboard and explain its
     value or features.




Copyright 2012 John Wiley & Sons, Inc.
                                                     3-39
Chapter 3 Link Library

    Advizor Solutions, data analytics and visualization
     http://advizorsolutions.com/

    Clarabridge: How Text Mining Works http://clarabridge.com/

    SAS Text Miner http://sas.com/

    Tableau data visualization software http://tableausoftware.com/data-
     visualization-software/

    EMC Corp., enterprise content management http://emc.com

    Oracle DBMS http://oracle.com/




Copyright 2012 John Wiley & Sons, Inc.
                                                                            3-40

More Related Content

What's hot

2012 security services clientprex
2012 security services clientprex2012 security services clientprex
2012 security services clientprexKim Aarenstrup
 
Backing up Android and iOs devices
Backing up Android and iOs devicesBacking up Android and iOs devices
Backing up Android and iOs devicesiSSAL
 
The uc journey_10_18
The uc journey_10_18The uc journey_10_18
The uc journey_10_18arif muhamad
 
BYOD SCOPE: A Study of Corporate Policies in Pakistan
BYOD SCOPE: A Study of Corporate Policies in PakistanBYOD SCOPE: A Study of Corporate Policies in Pakistan
BYOD SCOPE: A Study of Corporate Policies in PakistanShuja Ahmad
 
Forrester: How Organizations Are Improving Business Resiliency with Continuou...
Forrester: How Organizations Are Improving Business Resiliency with Continuou...Forrester: How Organizations Are Improving Business Resiliency with Continuou...
Forrester: How Organizations Are Improving Business Resiliency with Continuou...EMC
 
Ecm implementation planning_workshop_hospital_sample
Ecm implementation planning_workshop_hospital_sampleEcm implementation planning_workshop_hospital_sample
Ecm implementation planning_workshop_hospital_sampleChristopher Wynder
 
eCommerce session 3 MOGHIMI
eCommerce session 3 MOGHIMIeCommerce session 3 MOGHIMI
eCommerce session 3 MOGHIMIBahman Moghimi
 
Compliance With Data Security Policies
Compliance With Data Security PoliciesCompliance With Data Security Policies
Compliance With Data Security PoliciesHongyang Wang
 
Ssi Data Protection Solutions V0.2
Ssi Data Protection Solutions V0.2Ssi Data Protection Solutions V0.2
Ssi Data Protection Solutions V0.2olambel
 
Business horizonsweston
Business horizonswestonBusiness horizonsweston
Business horizonswestonIkram KASSOU
 
Jennings it security overview 1 2
Jennings it security overview 1 2Jennings it security overview 1 2
Jennings it security overview 1 2Donald Jennings
 
Big Data and Content Management. SkyDox and the European Court of Human Righ...
Big Data and Content Management.  SkyDox and the European Court of Human Righ...Big Data and Content Management.  SkyDox and the European Court of Human Righ...
Big Data and Content Management. SkyDox and the European Court of Human Righ...SkyDox LTD
 
Big Data Whitepaper - Streams and Big Insights Integration Patterns
Big Data Whitepaper  - Streams and Big Insights Integration PatternsBig Data Whitepaper  - Streams and Big Insights Integration Patterns
Big Data Whitepaper - Streams and Big Insights Integration PatternsMauricio Godoy
 

What's hot (20)

2012 security services clientprex
2012 security services clientprex2012 security services clientprex
2012 security services clientprex
 
Backing up Android and iOs devices
Backing up Android and iOs devicesBacking up Android and iOs devices
Backing up Android and iOs devices
 
The uc journey_10_18
The uc journey_10_18The uc journey_10_18
The uc journey_10_18
 
Cloud computing in context
Cloud computing in contextCloud computing in context
Cloud computing in context
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
BYOD SCOPE: A Study of Corporate Policies in Pakistan
BYOD SCOPE: A Study of Corporate Policies in PakistanBYOD SCOPE: A Study of Corporate Policies in Pakistan
BYOD SCOPE: A Study of Corporate Policies in Pakistan
 
Forrester: How Organizations Are Improving Business Resiliency with Continuou...
Forrester: How Organizations Are Improving Business Resiliency with Continuou...Forrester: How Organizations Are Improving Business Resiliency with Continuou...
Forrester: How Organizations Are Improving Business Resiliency with Continuou...
 
Ecm implementation planning_workshop_hospital_sample
Ecm implementation planning_workshop_hospital_sampleEcm implementation planning_workshop_hospital_sample
Ecm implementation planning_workshop_hospital_sample
 
Identity Management In Cloud Computing
Identity Management In Cloud ComputingIdentity Management In Cloud Computing
Identity Management In Cloud Computing
 
eCommerce session 3 MOGHIMI
eCommerce session 3 MOGHIMIeCommerce session 3 MOGHIMI
eCommerce session 3 MOGHIMI
 
Compliance With Data Security Policies
Compliance With Data Security PoliciesCompliance With Data Security Policies
Compliance With Data Security Policies
 
Ssi Data Protection Solutions V0.2
Ssi Data Protection Solutions V0.2Ssi Data Protection Solutions V0.2
Ssi Data Protection Solutions V0.2
 
Thomas Inman
Thomas InmanThomas Inman
Thomas Inman
 
Business horizonsweston
Business horizonswestonBusiness horizonsweston
Business horizonsweston
 
Jennings it security overview 1 2
Jennings it security overview 1 2Jennings it security overview 1 2
Jennings it security overview 1 2
 
Big Data and Content Management. SkyDox and the European Court of Human Righ...
Big Data and Content Management.  SkyDox and the European Court of Human Righ...Big Data and Content Management.  SkyDox and the European Court of Human Righ...
Big Data and Content Management. SkyDox and the European Court of Human Righ...
 
E intelligence
E intelligenceE intelligence
E intelligence
 
Big Data Whitepaper - Streams and Big Insights Integration Patterns
Big Data Whitepaper  - Streams and Big Insights Integration PatternsBig Data Whitepaper  - Streams and Big Insights Integration Patterns
Big Data Whitepaper - Streams and Big Insights Integration Patterns
 
Gov civilworkshop
Gov civilworkshopGov civilworkshop
Gov civilworkshop
 
Lastmile banking v1.3
Lastmile banking v1.3Lastmile banking v1.3
Lastmile banking v1.3
 

Viewers also liked

Data warehouse architecture
Data warehouse architectureData warehouse architecture
Data warehouse architecturepcherukumalla
 
Information technology for management (6th edition)
Information technology for management (6th edition)Information technology for management (6th edition)
Information technology for management (6th edition)MShuibMJ
 
Strategic Management and Information Technology Outsourcing
Strategic Management and Information Technology OutsourcingStrategic Management and Information Technology Outsourcing
Strategic Management and Information Technology OutsourcingFarooq Omar
 
Chapter 8 operating systems and utility programs
Chapter 8   operating systems and utility programsChapter 8   operating systems and utility programs
Chapter 8 operating systems and utility programshaider ali
 

Viewers also liked (6)

Data warehouse architecture
Data warehouse architectureData warehouse architecture
Data warehouse architecture
 
Chapter 2
Chapter 2Chapter 2
Chapter 2
 
Information technology for management (6th edition)
Information technology for management (6th edition)Information technology for management (6th edition)
Information technology for management (6th edition)
 
Strategic Management and Information Technology Outsourcing
Strategic Management and Information Technology OutsourcingStrategic Management and Information Technology Outsourcing
Strategic Management and Information Technology Outsourcing
 
Chapter 8 operating systems and utility programs
Chapter 8   operating systems and utility programsChapter 8   operating systems and utility programs
Chapter 8 operating systems and utility programs
 
Windows 10
Windows 10Windows 10
Windows 10
 

Similar to Chapter 03 it-8ed-volonino

Chapter 3Data Management,Big Data Analytics, andRecords Ma.docx
Chapter 3Data Management,Big Data Analytics, andRecords Ma.docxChapter 3Data Management,Big Data Analytics, andRecords Ma.docx
Chapter 3Data Management,Big Data Analytics, andRecords Ma.docxketurahhazelhurst
 
Chapter 3Data Management,Big Data Analytics, andRecords Ma.docx
Chapter 3Data Management,Big Data Analytics, andRecords Ma.docxChapter 3Data Management,Big Data Analytics, andRecords Ma.docx
Chapter 3Data Management,Big Data Analytics, andRecords Ma.docxchristinemaritza
 
IT for Management On-Demand Strategies for Performance, Growth,.docx
IT for Management On-Demand Strategies for Performance, Growth,.docxIT for Management On-Demand Strategies for Performance, Growth,.docx
IT for Management On-Demand Strategies for Performance, Growth,.docxvrickens
 
Chapter 2Data Governance and IT Architecture Support Long-Term
Chapter 2Data Governance and IT Architecture Support Long-TermChapter 2Data Governance and IT Architecture Support Long-Term
Chapter 2Data Governance and IT Architecture Support Long-TermEstelaJeffery653
 
Chapter 2Data Governance and IT Architecture Support Long-Term.docx
Chapter 2Data Governance and IT Architecture Support Long-Term.docxChapter 2Data Governance and IT Architecture Support Long-Term.docx
Chapter 2Data Governance and IT Architecture Support Long-Term.docxcravennichole326
 
Encrypted Data Management With Deduplication In Cloud...
Encrypted Data Management With Deduplication In Cloud...Encrypted Data Management With Deduplication In Cloud...
Encrypted Data Management With Deduplication In Cloud...Angie Jorgensen
 
Database Systems
Database SystemsDatabase Systems
Database SystemsUsman Tariq
 
database disegn.pptx
database disegn.pptxdatabase disegn.pptx
database disegn.pptxBARHAMMUSIC
 
Database Systems
Database SystemsDatabase Systems
Database SystemsUsman Tariq
 
CHAPTER-4_RELATIONAL-DATABASE.pptx
CHAPTER-4_RELATIONAL-DATABASE.pptxCHAPTER-4_RELATIONAL-DATABASE.pptx
CHAPTER-4_RELATIONAL-DATABASE.pptxRiaBago
 
Data Warehouse: A Primer
Data Warehouse: A PrimerData Warehouse: A Primer
Data Warehouse: A PrimerIJRTEMJOURNAL
 
Bca examination 2016 dbms
Bca examination 2016 dbmsBca examination 2016 dbms
Bca examination 2016 dbmsAnjaan Gajendra
 
IT6701 Information Management - Unit III
IT6701 Information Management - Unit IIIIT6701 Information Management - Unit III
IT6701 Information Management - Unit IIIpkaviya
 
IBM InfoSphere Optim Solutions - Highlights
IBM InfoSphere Optim Solutions - HighlightsIBM InfoSphere Optim Solutions - Highlights
IBM InfoSphere Optim Solutions - HighlightsAdam Gartenberg
 

Similar to Chapter 03 it-8ed-volonino (20)

Chapter 3Data Management,Big Data Analytics, andRecords Ma.docx
Chapter 3Data Management,Big Data Analytics, andRecords Ma.docxChapter 3Data Management,Big Data Analytics, andRecords Ma.docx
Chapter 3Data Management,Big Data Analytics, andRecords Ma.docx
 
Chapter 3Data Management,Big Data Analytics, andRecords Ma.docx
Chapter 3Data Management,Big Data Analytics, andRecords Ma.docxChapter 3Data Management,Big Data Analytics, andRecords Ma.docx
Chapter 3Data Management,Big Data Analytics, andRecords Ma.docx
 
IT for Management On-Demand Strategies for Performance, Growth,.docx
IT for Management On-Demand Strategies for Performance, Growth,.docxIT for Management On-Demand Strategies for Performance, Growth,.docx
IT for Management On-Demand Strategies for Performance, Growth,.docx
 
Chapter 2Data Governance and IT Architecture Support Long-Term
Chapter 2Data Governance and IT Architecture Support Long-TermChapter 2Data Governance and IT Architecture Support Long-Term
Chapter 2Data Governance and IT Architecture Support Long-Term
 
Chapter 2Data Governance and IT Architecture Support Long-Term.docx
Chapter 2Data Governance and IT Architecture Support Long-Term.docxChapter 2Data Governance and IT Architecture Support Long-Term.docx
Chapter 2Data Governance and IT Architecture Support Long-Term.docx
 
Ch03
Ch03Ch03
Ch03
 
Encrypted Data Management With Deduplication In Cloud...
Encrypted Data Management With Deduplication In Cloud...Encrypted Data Management With Deduplication In Cloud...
Encrypted Data Management With Deduplication In Cloud...
 
Database Systems
Database SystemsDatabase Systems
Database Systems
 
3 data mgmt
3 data mgmt3 data mgmt
3 data mgmt
 
database disegn.pptx
database disegn.pptxdatabase disegn.pptx
database disegn.pptx
 
Lecture1-IS322(Data&InfoMang-introduction)
Lecture1-IS322(Data&InfoMang-introduction)Lecture1-IS322(Data&InfoMang-introduction)
Lecture1-IS322(Data&InfoMang-introduction)
 
Lecture1 is322 data&infomanag(introduction)(old curr)
Lecture1 is322 data&infomanag(introduction)(old curr)Lecture1 is322 data&infomanag(introduction)(old curr)
Lecture1 is322 data&infomanag(introduction)(old curr)
 
Lecture1 is322 data&infomanag(introduction)(old curr)
Lecture1 is322 data&infomanag(introduction)(old curr)Lecture1 is322 data&infomanag(introduction)(old curr)
Lecture1 is322 data&infomanag(introduction)(old curr)
 
Database Systems
Database SystemsDatabase Systems
Database Systems
 
CHAPTER-4_RELATIONAL-DATABASE.pptx
CHAPTER-4_RELATIONAL-DATABASE.pptxCHAPTER-4_RELATIONAL-DATABASE.pptx
CHAPTER-4_RELATIONAL-DATABASE.pptx
 
Data Warehouse: A Primer
Data Warehouse: A PrimerData Warehouse: A Primer
Data Warehouse: A Primer
 
Database Management System 1
Database Management System 1Database Management System 1
Database Management System 1
 
Bca examination 2016 dbms
Bca examination 2016 dbmsBca examination 2016 dbms
Bca examination 2016 dbms
 
IT6701 Information Management - Unit III
IT6701 Information Management - Unit IIIIT6701 Information Management - Unit III
IT6701 Information Management - Unit III
 
IBM InfoSphere Optim Solutions - Highlights
IBM InfoSphere Optim Solutions - HighlightsIBM InfoSphere Optim Solutions - Highlights
IBM InfoSphere Optim Solutions - Highlights
 

Recently uploaded

Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 

Recently uploaded (20)

Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 

Chapter 03 it-8ed-volonino

  • 1. Part II. Data and Network Infrastructure C hapter 3 Data, Text, and Document Management M a n a g e m e n t I n fo r m a t i o n S y s te m s EIMBA Copyright 2012 John Wiley & Sons, Inc. 3-1
  • 2. Chapter 3 Outline 3.1 Data, Text, and Document Management 3.2 File Management Systems 3.3 Database Management Systems 3.4 Data Warehouses, Data Marts, and Data Centers 3.5 Enterprise Content Management Copyright 2012 John Wiley & Sons, Inc. 3-2
  • 3. Chapter 3 Learning Objectives  Describe data, text, and document management, and their impacts on performance.  Understand file management systems.  Understand the functions of databases and database management systems.  Describe the tactical and strategic benefits of data warehouses, data marts, and data centers. Copyright 2012 John Wiley & Sons, Inc. 3-3
  • 4. For Class Discussion & Debate Wendy's International Relies on Text Mining for Customer Experience Management Scenario for Brainstorming & Discussion (see book for full text) 1. Select an industry, company, or public sector. 2. Identify costs due to ignorance about customers’ or constituents’ experiences. 3. Explain how your selection could benefit from text analytics that provided feedback within 24 hours. 4. Compare and assess your answers with others in class. Copyright 2012 John Wiley & Sons, Inc. 3-4
  • 5. Debate (see book for full text) • Select one side of the argument, as described in the textbook. • Debate whether investments in text message collection and mining should be made even if no ROI can be determined in advance. • Provide convincing arguments either in favor of or against the investment in text message collection and mining. Copyright 2012 John Wiley & Sons, Inc. 3-5
  • 6. 3.1 Data, Text, and Document Management Data, text, and documents are strategic assets. Vast quantities are: • created and collected • then stored – often in 5 or more locations Data, text, and document management helps companies improve productivity by insuring that people can find what they need without having to conduct a long and difficult search. Copyright 2012 John Wiley & Sons, Inc. 3-6
  • 7. Data Management Why does data management matter? • No enterprise can be effective without high quality data that is accessible when needed. • Data that’s incomplete or out of context cannot be trusted. • Organizations with at least 1,000 knowledge workers lose ~ $5.7 million annually in time wasted by employees reformatting data as they move among applications. What is the goal of data management? • To provide the infrastructure and tools to transform raw data into usable information of the highest quality. Copyright 2012 John Wiley & Sons, Inc. 3-7
  • 8. Data Management Why is data management difficult and expensive? • Volume of data is increasing exponentially. • Data is scattered throughout the organization. • Data is created and used offline without going through quality control checks. • Data may be redundant and out-of-date, creating a huge maintenance problem. Copyright 2012 John Wiley & Sons, Inc. 3-8
  • 9. Data Management Current key issues  Master data management (MDM): Processes to integrate data from various sources and enterprise apps in order to create a unified view of the data.  Document management system (DMS): Hardware and software to manage, archive, and purge files and other electronic documents (e-documents).  Green computing: Efforts to conserve natural resources and reduce effects of computer usage on the environment. Copyright 2012 John Wiley & Sons, Inc. 3-9
  • 10. IT at Work 3.1 – Healthcare Sector Data Errors Cost Billions of Dollars and Put Lives at Risk  Every day, healthcare administrators and others throughout the healthcare supply chain waste 24% --30% of their time correcting data errors.  Each incorrect transaction costs $60 to $80 to correct.  About 60% of all invoices among supply chain partners have errors, and each invoice error costs $40 to $400 to reconcile.  Each year, billions of dollars are wasted in the healthcare supply chain because of supply chain data disconnects. Copyright 2012 John Wiley & Sons, Inc. 3-10
  • 11. IT at Work 3.1 (continued) Data Errors Cost Billions of Dollars and Put Lives at Risk Benefits from data synchronization in the healthcare sector and supply chair: • Easier and faster product sourcing because of accurate and consistent item information • Significantly reduces the amount of fraud or unauthorized purchasing • Reduces unnecessary inventories • Lowers prices because purchase volumes became apparent • Improves patient safety Copyright 2012 John Wiley & Sons, Inc. 3-11
  • 12. Data management is a structured approach for capturing, storing, processing, integrating, distributing, securi ng, and archiving data effectively throughout their life cycle. Figure 3.2 Data life cycle Copyright 2012 John Wiley & Sons, Inc. 3-12
  • 13. Data problems Copyright 2012 John Wiley & Sons, Inc. 3-13
  • 14. Data principles  Principle of diminishing data value. The more resent the information, the more valuable it is  Principle of 90/90 data use: 90% of data is seldom accessed after 90 days.  Principle of data in context. Investment in DM infrastructure may be huge. Copyright 2012 John Wiley & Sons, Inc. 3-14
  • 15. IT at Work 3.4  Check page 69 Copyright 2012 John Wiley & Sons, Inc. 3-15
  • 16. Transforming data into knowledge  Text mining and analytics: • Exploration • Preprocessing • Categorizing and modeling Copyright 2012 John Wiley & Sons, Inc. 3-16
  • 17. Data from various sources are extracted, transformed, & loaded (ETL) into a data warehouse; then used to support functions and apps throughout the enterprise. Figure 3.4. Model of an Enterprise Data Warehouse Copyright 2012 John Wiley & Sons, Inc. 3-17
  • 18. 3.2 File Management Systems Computer systems organize data into a hierarchy: bits, bytes, fields, records, files, and databases Figure 3.6 Hierarchy of data for a computer-based file. Copyright 2012 John Wiley & Sons, Inc. 3-18
  • 19. Limitations of the File Environment  When organizations began using computers, they started with one application at a time, usually accounting, billing, and payroll. Each app was designed to be a stand-alone system, which led to data problems.  Data problems with a file environment: • data redundancy • data inconsistency • data isolation • data security Copyright 2012 John Wiley & Sons, Inc. 3-19
  • 20. • Stand-alone systems result in data redundancy, inconsistency, and isolation. •Database management systems helped solve the data problems of file-based systems. Copyright 2012 John Wiley & Sons, Inc. 3-20
  • 21. Figure 3.10 Database management system provides access to all data in the database. Copyright 2012 John Wiley & Sons, Inc. 3-21
  • 22. 3.3 Database Management Systems (DMBS)  Numerous data sources • clickstream data from Web and e-commerce applications • detailed data from POS terminals • filtered data from CRM, supply chain, and enterprise resource planning applications  DBMS permits an organization to centralize data, manage them efficiently, and give application programs access to the stored data. Copyright 2012 John Wiley & Sons, Inc. 3-22
  • 23. 2 types of databases: a) Centralized database b) Distributed database with complete or partial copies of the central database in more than one location Copyright 2012 John Wiley & Sons, Inc. 3-23
  • 24. Functions of a Database Management System (DBMS)  Data filtering and profiling: Inspecting the data for errors, inconsistencies, redundancies, and incomplete information.  Data quality: Correcting, standardizing, and verifying the integrity of the data.  Data synchronization: Integrating, matching, or linking data from disparate sources.  Data enrichment: Enhancing data using information from internal and external data sources.  Data maintenance: Checking and controlling data integrity over time. Copyright 2012 John Wiley & Sons, Inc. 3-24
  • 25. 3.4 Data Warehouses, Data Marts, and Data Centers  Data warehouse: a repository in which data are organized so that they can be readily analyzed using methods such as data mining, decision support, querying, and other applications. • enable managers and knowledge workers to leverage enterprise data to make the smartest decisions • enable OLAP (online analytic processing)  Data marts: designed for a strategic business unit (SBU) or a single department.  Data centers: facilities containing mission-critical ISs and components that deliver data and IT services to the enterprise. Copyright 2012 John Wiley & Sons, Inc. 3-25
  • 26. Figure 3.11 Data warehouse framework and views. Copyright 2012 John Wiley & Sons, Inc. 3-26
  • 27. Characteristics of a data warehouse  Organization. Data are organized by subject (e.g., by customer, vendor, product, price level, and region), and contain information relevant for decision support only.  Consistency. Data in different operational databases may be encoded differently. For example, gender data may be encoded 0 and 1 in one operational system and “m” and “f” in another. In the warehouse they will be coded in a consistent manner.  Time variant. The data are kept for many years so they can be used for trends, forecasting, and comparisons over time.  Nonvolatile. Once entered into the warehouse, data are not updated.  Relational. Typically the data warehouse uses a relational structure.  Client/server. The data warehouse uses the client/server architecture mainly to provide the end user an easy access to its data.  Web-based. Today’s data warehouses are designed to provide an efficient computing environment for Web-based applications (Rundensteiner et. al., 2000). Copyright 2012 John Wiley & Sons, Inc. 3-27
  • 28. Copyright 2012 John Wiley & Sons, Inc. 3-28
  • 29. Building an Enterprise Data Warehouse (EDW) A company that is considering building a DW first needs to address a series of basic questions to avoid a failure: • Does top management support the DW? • Do users want access to a broad range of data • Do users want data access and analysis tools? • Do users understand how to use the DW to solve business problems? • Does the unit have one or more power users who can understand DW technologies? Copyright 2012 John Wiley & Sons, Inc. 3-29
  • 30. Figure 3.12 Teradata Corp.’s EDW Copyright 2012 John Wiley & Sons, Inc. 3-30
  • 31. Suitability Data warehousing is most appropriate for organizations that have some of the following characteristics:  End users need to access large amounts of data  Operational data are stored in different systems  The organization serves a large, diverse customer base  The same data are represented differently in different systems  Extensive end-user computing is performed Copyright 2012 John Wiley & Sons, Inc. 3-31
  • 32. 3.5 Enterprise Content Management ECM includes:  electronic document management  Web content management  digital asset management, and  electronic records management (ERM) Copyright 2012 John Wiley & Sons, Inc. 3-32
  • 33. Figure 3.13 Electronic records management from creation to retention or destruction Copyright 2012 John Wiley & Sons, Inc. 3-33
  • 34. Unstructured business records  Businesses generate volumes of documents, messages, and memos that, by their nature, contain unstructured content that cannot be put into a database.  Many of these materials are business records that must be retained and made available when requested by auditors, investigators, the SEC, the IRS, or other authorities.  To be retrievable, business records must be organized and indexed.  Records are not needed for current operations or decisions, are archived—moved into longer-term storage. Copyright 2012 John Wiley & Sons, Inc. 3-34
  • 35. Business Value of E-Records Management  Companies need to be prepared to respond to an audit, federal investigation, lawsuit, or other legal action against it. • Examples of lawsuits: patent violations, fraud, product safety negligence, theft of intellectual property, breach of contract, wrongful termination, harassment, and discrimination  E-discovery is the process of gathering electronically stored information in preparation for trial, legal or regulatory investigation, or administrative action as required by law. • When a company receives an e-discovery request, the company must produce what is requested—or face charges of obstructing justice or being in contempt of court. Copyright 2012 John Wiley & Sons, Inc. 3-35
  • 36. Companies have incurred huge costs for not responding to e-discovery  Failure to save e-mails resulted in a $2.75 million fine for Phillip Morris.  Failure to respond to e-discovery requests cost Bank of America $10 million in fines.  Failure to produce backup tapes and deleted e-mails resulted in a $29.3 million jury verdict against UBS Warburg in the landmark case, Zubulake v. UBS Warburg. Copyright 2012 John Wiley & Sons, Inc. 3-36
  • 37. Copyright 2012 John Wiley & Sons, Inc. 3-37
  • 38. Copyright 2012 John Wiley & Sons, Inc. 3-38
  • 39. Exercise  Visit Analysis Factory at analysisfactory.com Click view the interactive business solution dashboards.  Select one type of dashboard and explain its value or features. Copyright 2012 John Wiley & Sons, Inc. 3-39
  • 40. Chapter 3 Link Library  Advizor Solutions, data analytics and visualization http://advizorsolutions.com/  Clarabridge: How Text Mining Works http://clarabridge.com/  SAS Text Miner http://sas.com/  Tableau data visualization software http://tableausoftware.com/data- visualization-software/  EMC Corp., enterprise content management http://emc.com  Oracle DBMS http://oracle.com/ Copyright 2012 John Wiley & Sons, Inc. 3-40