SlideShare a Scribd company logo
1 of 2
Moneyworks Data Analysis
Recommendations
A. Continuerefining existing systems
1. Spend more time & resources increasing timestamp
consistency & accuracy.
2. Establish data analysis/data mining weekly needs to
inform future app upgrades.
B. Maintain as much homogeneity between testers as
possible.
1. Onboard successfully.
a) Establishtechnical difficulties point of contactin
initial email.
b) Stress needto keepapp on during the whole day.
2. Stay interactive.
a) Starbucks check-in:awesome!Fun suggestions
keeppeople engaged.
b) Ask with eachnew rollout what people have been
thinking.
Data References
On multiple accounts, user and system data did not always match up.
 MW was set out to measure activity every 15 seconds. It cannot be determined whether there is a
specific system glitch or user behavior breaking this parameter but there are spans as large as 3
hours 29 minutes (Jonathan Morales, 7/30) and small as 4 seconds (Timothy Prentice, 08/05,
23:17:02 to 23:17:06) between measurements. When assessing user/system accuracy, small time
intervals are very important. Jonathan Erickson’s times seemed the most consistently small
(every 9-10 seconds), while even users without possible user behavior interference show
inconsistent measurement times (Sammy Puga ranges from 9 seconds to 2 minutes and 15
seconds). A possible explanation could be with Android’s confidence levels on user activity.
Further analysis is warranted.
 As data analyses continue, analysts can focus on specifities. Being the first analysis, MW can
gather a general sense of how user and system data are generally merging. Going forward, MW
can decide if it wants to focus further on studying accuracy of specific times (breakfast, lunch,
weekends, Mondays) and/or activities (still, still/walking, driving). Boiling down specific data
times/user activities will enable a good foundation for future MW user trend reports.
 Of the six users (Jonathan Erickson, Jonathan Morales, Mark Shepherd, Michael Argano, Sammy
Puga, and Timothy Prentice), data cannot be analyzed for two. While MW is successfully
receiving Michael Argano’s system data, there is either a technical difficulty or the user is not
submitting his user logs. Mark Shepherd is just the opposite: the user data is coming in fine but
there is a dirth of system data. I recommend having a check-in after 3 days with every new tester
to make sure everything is functioning properly.
Next Steps
1. Clean up analysis sheets to minimize excess system timestamps
2. Follow up with Mark Shepherd and Michael Argano to see if we can help somehow with data
collection.
3. Ask all testers to keep app running in the background throughout the day.
4. Dig into the data! Study confidence levels with MW status versus actual status.

More Related Content

What's hot

on false data-injection attacks against power system state estimation modelin...
on false data-injection attacks against power system state estimation modelin...on false data-injection attacks against power system state estimation modelin...
on false data-injection attacks against power system state estimation modelin...swathi78
 
10 Year Impact Award Presentation - Duplicate Bug Reports Considered Harmful ...
10 Year Impact Award Presentation - Duplicate Bug Reports Considered Harmful ...10 Year Impact Award Presentation - Duplicate Bug Reports Considered Harmful ...
10 Year Impact Award Presentation - Duplicate Bug Reports Considered Harmful ...Nicolas Bettenburg
 
Machine Learning
Machine LearningMachine Learning
Machine LearningPiyukornule
 
Statistics in Journalism
Statistics in JournalismStatistics in Journalism
Statistics in JournalismRegina Nuzzo
 
A Predictive Analytics by tom davenport.ppt
A Predictive Analytics  by tom davenport.pptA Predictive Analytics  by tom davenport.ppt
A Predictive Analytics by tom davenport.pptKaustubh Srivastava
 
ERS Project PPT
ERS Project PPTERS Project PPT
ERS Project PPTAnnu G
 
quantitative marketing techniques
quantitative marketing techniques quantitative marketing techniques
quantitative marketing techniques Kumarrebal
 
Emotion Sense: From Design to Deployment
Emotion Sense: From Design to DeploymentEmotion Sense: From Design to Deployment
Emotion Sense: From Design to DeploymentNeal Lathia
 

What's hot (9)

on false data-injection attacks against power system state estimation modelin...
on false data-injection attacks against power system state estimation modelin...on false data-injection attacks against power system state estimation modelin...
on false data-injection attacks against power system state estimation modelin...
 
10 Year Impact Award Presentation - Duplicate Bug Reports Considered Harmful ...
10 Year Impact Award Presentation - Duplicate Bug Reports Considered Harmful ...10 Year Impact Award Presentation - Duplicate Bug Reports Considered Harmful ...
10 Year Impact Award Presentation - Duplicate Bug Reports Considered Harmful ...
 
Machine Learning
Machine LearningMachine Learning
Machine Learning
 
CAPI _TRIPS_SMS
CAPI _TRIPS_SMSCAPI _TRIPS_SMS
CAPI _TRIPS_SMS
 
Statistics in Journalism
Statistics in JournalismStatistics in Journalism
Statistics in Journalism
 
A Predictive Analytics by tom davenport.ppt
A Predictive Analytics  by tom davenport.pptA Predictive Analytics  by tom davenport.ppt
A Predictive Analytics by tom davenport.ppt
 
ERS Project PPT
ERS Project PPTERS Project PPT
ERS Project PPT
 
quantitative marketing techniques
quantitative marketing techniques quantitative marketing techniques
quantitative marketing techniques
 
Emotion Sense: From Design to Deployment
Emotion Sense: From Design to DeploymentEmotion Sense: From Design to Deployment
Emotion Sense: From Design to Deployment
 

Similar to 08.07 Moneyworks Data Analysis

Simulation pitfalls p302023
Simulation pitfalls p302023Simulation pitfalls p302023
Simulation pitfalls p302023vijaykale1981
 
Real-time Classification of Malicious URLs on Twitter using Machine Activity ...
Real-time Classification of Malicious URLs on Twitter using Machine Activity ...Real-time Classification of Malicious URLs on Twitter using Machine Activity ...
Real-time Classification of Malicious URLs on Twitter using Machine Activity ...Pete Burnap
 
Role of computers in research
Role of computers in researchRole of computers in research
Role of computers in researchSaravana Kumar
 
Sad 201 project sparc vision online library-assignment 2
Sad 201  project sparc vision  online library-assignment 2Sad 201  project sparc vision  online library-assignment 2
Sad 201 project sparc vision online library-assignment 2Justin Chinkolenji
 
Data Warehouses & Deployment By Ankita dubey
Data Warehouses & Deployment By Ankita dubeyData Warehouses & Deployment By Ankita dubey
Data Warehouses & Deployment By Ankita dubeyAnkita Dubey
 
MSA – Overview
MSA – OverviewMSA – Overview
MSA – OverviewMatt Hansen
 
Full Docu IT Thesis Project In Computerized Inventory System In Brother Burg...
Full Docu IT Thesis Project In Computerized Inventory System In Brother  Burg...Full Docu IT Thesis Project In Computerized Inventory System In Brother  Burg...
Full Docu IT Thesis Project In Computerized Inventory System In Brother Burg...JON ICK BOGUAT
 
Voice of the customer requirements overview
Voice of the customer requirements overviewVoice of the customer requirements overview
Voice of the customer requirements overviewMichael Dattilio
 
Adaptive Real Time Data Mining Methodology for Wireless Body Area Network Bas...
Adaptive Real Time Data Mining Methodology for Wireless Body Area Network Bas...Adaptive Real Time Data Mining Methodology for Wireless Body Area Network Bas...
Adaptive Real Time Data Mining Methodology for Wireless Body Area Network Bas...acijjournal
 
Post 1We all know that our era belongs to technology; we are ve
Post 1We all know that our era belongs to technology; we are vePost 1We all know that our era belongs to technology; we are ve
Post 1We all know that our era belongs to technology; we are veanhcrowley
 
Post 1We all know that our era belongs to technology; we are ve.docx
Post 1We all know that our era belongs to technology; we are ve.docxPost 1We all know that our era belongs to technology; we are ve.docx
Post 1We all know that our era belongs to technology; we are ve.docxstilliegeorgiana
 
SEAMLESS AUTOMATION AND INTEGRATION OF MACHINE LEARNING CAPABILITIES FOR BIG ...
SEAMLESS AUTOMATION AND INTEGRATION OF MACHINE LEARNING CAPABILITIES FOR BIG ...SEAMLESS AUTOMATION AND INTEGRATION OF MACHINE LEARNING CAPABILITIES FOR BIG ...
SEAMLESS AUTOMATION AND INTEGRATION OF MACHINE LEARNING CAPABILITIES FOR BIG ...ijdpsjournal
 
SEAMLESS AUTOMATION AND INTEGRATION OF MACHINE LEARNING CAPABILITIES FOR BIG ...
SEAMLESS AUTOMATION AND INTEGRATION OF MACHINE LEARNING CAPABILITIES FOR BIG ...SEAMLESS AUTOMATION AND INTEGRATION OF MACHINE LEARNING CAPABILITIES FOR BIG ...
SEAMLESS AUTOMATION AND INTEGRATION OF MACHINE LEARNING CAPABILITIES FOR BIG ...ijdpsjournal
 
Computer is an electronic device or combination of electronic devices
Computer is an electronic device or combination of electronic devicesComputer is an electronic device or combination of electronic devices
Computer is an electronic device or combination of electronic devicesArti Arora
 
IRJET - Machine Learning for Diagnosis of Diabetes
IRJET - Machine Learning for Diagnosis of DiabetesIRJET - Machine Learning for Diagnosis of Diabetes
IRJET - Machine Learning for Diagnosis of DiabetesIRJET Journal
 
Health Informatics- Module 3-Chapter 3.pptx
Health Informatics- Module 3-Chapter 3.pptxHealth Informatics- Module 3-Chapter 3.pptx
Health Informatics- Module 3-Chapter 3.pptxArti Parab Academics
 
CHM201 General Chemistry and Laboratory ILaboratory 6 – Ideal Ga
CHM201 General Chemistry and Laboratory ILaboratory 6 – Ideal GaCHM201 General Chemistry and Laboratory ILaboratory 6 – Ideal Ga
CHM201 General Chemistry and Laboratory ILaboratory 6 – Ideal GaJinElias52
 

Similar to 08.07 Moneyworks Data Analysis (20)

Simulation pitfalls p302023
Simulation pitfalls p302023Simulation pitfalls p302023
Simulation pitfalls p302023
 
Real-time Classification of Malicious URLs on Twitter using Machine Activity ...
Real-time Classification of Malicious URLs on Twitter using Machine Activity ...Real-time Classification of Malicious URLs on Twitter using Machine Activity ...
Real-time Classification of Malicious URLs on Twitter using Machine Activity ...
 
Role of computers in research
Role of computers in researchRole of computers in research
Role of computers in research
 
Sad 201 project sparc vision online library-assignment 2
Sad 201  project sparc vision  online library-assignment 2Sad 201  project sparc vision  online library-assignment 2
Sad 201 project sparc vision online library-assignment 2
 
Data Warehouses & Deployment By Ankita dubey
Data Warehouses & Deployment By Ankita dubeyData Warehouses & Deployment By Ankita dubey
Data Warehouses & Deployment By Ankita dubey
 
Data analytics
Data analyticsData analytics
Data analytics
 
MSA – Overview
MSA – OverviewMSA – Overview
MSA – Overview
 
Full Docu IT Thesis Project In Computerized Inventory System In Brother Burg...
Full Docu IT Thesis Project In Computerized Inventory System In Brother  Burg...Full Docu IT Thesis Project In Computerized Inventory System In Brother  Burg...
Full Docu IT Thesis Project In Computerized Inventory System In Brother Burg...
 
Voice of the customer requirements overview
Voice of the customer requirements overviewVoice of the customer requirements overview
Voice of the customer requirements overview
 
Adaptive Real Time Data Mining Methodology for Wireless Body Area Network Bas...
Adaptive Real Time Data Mining Methodology for Wireless Body Area Network Bas...Adaptive Real Time Data Mining Methodology for Wireless Body Area Network Bas...
Adaptive Real Time Data Mining Methodology for Wireless Body Area Network Bas...
 
Post 1We all know that our era belongs to technology; we are ve
Post 1We all know that our era belongs to technology; we are vePost 1We all know that our era belongs to technology; we are ve
Post 1We all know that our era belongs to technology; we are ve
 
Post 1We all know that our era belongs to technology; we are ve.docx
Post 1We all know that our era belongs to technology; we are ve.docxPost 1We all know that our era belongs to technology; we are ve.docx
Post 1We all know that our era belongs to technology; we are ve.docx
 
SEAMLESS AUTOMATION AND INTEGRATION OF MACHINE LEARNING CAPABILITIES FOR BIG ...
SEAMLESS AUTOMATION AND INTEGRATION OF MACHINE LEARNING CAPABILITIES FOR BIG ...SEAMLESS AUTOMATION AND INTEGRATION OF MACHINE LEARNING CAPABILITIES FOR BIG ...
SEAMLESS AUTOMATION AND INTEGRATION OF MACHINE LEARNING CAPABILITIES FOR BIG ...
 
SEAMLESS AUTOMATION AND INTEGRATION OF MACHINE LEARNING CAPABILITIES FOR BIG ...
SEAMLESS AUTOMATION AND INTEGRATION OF MACHINE LEARNING CAPABILITIES FOR BIG ...SEAMLESS AUTOMATION AND INTEGRATION OF MACHINE LEARNING CAPABILITIES FOR BIG ...
SEAMLESS AUTOMATION AND INTEGRATION OF MACHINE LEARNING CAPABILITIES FOR BIG ...
 
Computer is an electronic device or combination of electronic devices
Computer is an electronic device or combination of electronic devicesComputer is an electronic device or combination of electronic devices
Computer is an electronic device or combination of electronic devices
 
IRJET - Machine Learning for Diagnosis of Diabetes
IRJET - Machine Learning for Diagnosis of DiabetesIRJET - Machine Learning for Diagnosis of Diabetes
IRJET - Machine Learning for Diagnosis of Diabetes
 
Health Informatics- Module 3-Chapter 3.pptx
Health Informatics- Module 3-Chapter 3.pptxHealth Informatics- Module 3-Chapter 3.pptx
Health Informatics- Module 3-Chapter 3.pptx
 
Mis
MisMis
Mis
 
CHM201 General Chemistry and Laboratory ILaboratory 6 – Ideal Ga
CHM201 General Chemistry and Laboratory ILaboratory 6 – Ideal GaCHM201 General Chemistry and Laboratory ILaboratory 6 – Ideal Ga
CHM201 General Chemistry and Laboratory ILaboratory 6 – Ideal Ga
 
onTune the differences
onTune the differencesonTune the differences
onTune the differences
 

08.07 Moneyworks Data Analysis

  • 1. Moneyworks Data Analysis Recommendations A. Continuerefining existing systems 1. Spend more time & resources increasing timestamp consistency & accuracy. 2. Establish data analysis/data mining weekly needs to inform future app upgrades. B. Maintain as much homogeneity between testers as possible. 1. Onboard successfully. a) Establishtechnical difficulties point of contactin initial email. b) Stress needto keepapp on during the whole day. 2. Stay interactive. a) Starbucks check-in:awesome!Fun suggestions keeppeople engaged. b) Ask with eachnew rollout what people have been thinking.
  • 2. Data References On multiple accounts, user and system data did not always match up.  MW was set out to measure activity every 15 seconds. It cannot be determined whether there is a specific system glitch or user behavior breaking this parameter but there are spans as large as 3 hours 29 minutes (Jonathan Morales, 7/30) and small as 4 seconds (Timothy Prentice, 08/05, 23:17:02 to 23:17:06) between measurements. When assessing user/system accuracy, small time intervals are very important. Jonathan Erickson’s times seemed the most consistently small (every 9-10 seconds), while even users without possible user behavior interference show inconsistent measurement times (Sammy Puga ranges from 9 seconds to 2 minutes and 15 seconds). A possible explanation could be with Android’s confidence levels on user activity. Further analysis is warranted.  As data analyses continue, analysts can focus on specifities. Being the first analysis, MW can gather a general sense of how user and system data are generally merging. Going forward, MW can decide if it wants to focus further on studying accuracy of specific times (breakfast, lunch, weekends, Mondays) and/or activities (still, still/walking, driving). Boiling down specific data times/user activities will enable a good foundation for future MW user trend reports.  Of the six users (Jonathan Erickson, Jonathan Morales, Mark Shepherd, Michael Argano, Sammy Puga, and Timothy Prentice), data cannot be analyzed for two. While MW is successfully receiving Michael Argano’s system data, there is either a technical difficulty or the user is not submitting his user logs. Mark Shepherd is just the opposite: the user data is coming in fine but there is a dirth of system data. I recommend having a check-in after 3 days with every new tester to make sure everything is functioning properly. Next Steps 1. Clean up analysis sheets to minimize excess system timestamps 2. Follow up with Mark Shepherd and Michael Argano to see if we can help somehow with data collection. 3. Ask all testers to keep app running in the background throughout the day. 4. Dig into the data! Study confidence levels with MW status versus actual status.