SlideShare a Scribd company logo
1 of 38
Introduction to Information Technology 
Turban, Rainer and Potter 
John Wiley & Sons, Inc. 
Copyright 2005 
Chapter 3
Data and Knowledge 
Management 
“ Copyright 2005 John Wiley & Sons Inc.” 1 
Chapter 3
Chapter Outline 
Data Management: A Critical Success Factor 
Data Warehousing 
Information and Knowledge Discovery with Business 
Intelligence 
Data Mining Concepts and Applications 
Data Visualization Technologies 
Web-Based Data Management Systems 
Introduction to Knowledge Management 
Information Technology in Knowledge Management 
“ Copyright 2005 John Wiley & Sons Inc.” Chapter 3 
2
Learning Objectives 
Recognize the importance of data, managerial issues, and life cycle . 
Describe the sources of data and their collection 
Describe document management systems. 
Explain the operation of data warehousing and its role in decision 
support 
Describe information and knowledge discovery and business 
intelligence 
Understand the power and benefits of data mining. 
Describe data presentation methods, and explain geographical 
information systems, visual simulations, and virtual reality as decision 
support tools 
Recognize the role of the web in data management. 
Define knowledge and describe the different types of knowledge. 
Describe the technologies that can be utilized in a knowledge 
management system 
“ Copyright 2005 John Wiley & Sons Inc.” Chapter 3 
3
3.1 Data Management 
 A critical success factor: IT applications cannot be 
done without using data. Data should be high-quality 
(accurate, complete, timely, consistent, accessible, 
relevant, and concise). 
 The Difficulties of managing Data: 
• The amount of data increases exponentially with time 
• Data are scattered throughout organization and are 
collected by many individuals using several methods 
and devices. 
• An ever- increasing amount of external data needs to 
be considered in making organizational decisions. 
• Data security, quality, and integrity are critical, yet are 
easily jeopardized. 
“ Copyright 2005 John Wiley & Sons Inc.” Chapter 3 
4
Critical Success Factors (CSF) 
Those few things that must go right in to ensure 
an organization’s survival and success 
“ Copyright 2005 John Wiley & Sons Inc.” Chapter 3 
5
Data Life Cycle 
“ Copyright 2005 John Wiley & Sons Inc.” Chapter 3 
6
Data Sources 
 Internal Data Sources: data about people, 
products, services, and processes. 
 Personal Data: IS users or other corporate 
employees may document their own 
expertise by creating personal data. 
 External Data Sources: Data from commercial 
databases to sensors and satellites. 
“ Copyright 2005 John Wiley & Sons Inc.” Chapter 3 
7
Document Management 
 The automated control of electronic documents, page 
images, spreadsheets, word processing documents, 
and other complex documents through their entire life 
cycle within organization. 
 The major tools of document management are 
workflow software, authoring tools, scanners, imaging 
systems, and database. 
 Document Management Systems (DMSs): Computer 
systems that identify store, retrieve, track, and 
present information in an electronic format to decision 
makers 
“ Copyright 2005 John Wiley & Sons Inc.” Chapter 3 
8
3.2 Data Warehousing 
 Transaction Processing: The data are 
organized in hierarchical structure and 
centrally processed 
 Analytical Processing: Analysis of 
accumulated data 
 Data Warehouse: A repository of subject-oriented 
historical data that are organized to 
be accessible in a form readily acceptable for 
analytical processing. 
“ Copyright 2005 John Wiley & Sons Inc.” Chapter 3 
9
Characteristics of a Data Warehouse 
Organization. Data are organized by subject and contain 
information relevant for decision support only . 
Consistency. Data in different operational databases may be 
encoded differently . In the data warehouse, though, they will be 
coded in a consistent manner. 
Time variant. The data are kept for many years so that they can 
be used for trends, forecasting, and comparisons over time. 
Non-volatile. Data are not updated once entered into the 
warehouse. 
Multidimensional. Typically the data warehouse uses a 
multidimensional structure . 
Web-based. Today’s data warehouse are designed to provide an 
efficient computing environment for web-based applications. 
“ Copyright 2005 John Wiley & Sons Inc.” Chapter 3 
10
Building a Data Warehouse 
“ Copyright 2005 John Wiley & Sons Inc.” Chapter 3 
11
Relational and Multidimensional Database 
 Relational databases store data in two – 
dimensional tables. Multidimensional 
databases typically store data in arrays, 
which consist of at least three business 
dimension. 
“ Copyright 2005 John Wiley & Sons Inc.” Chapter 3 
12
Data Marts 
Data Mart: A small data warehouse designed for a 
strategic business unit ( SBU) or a department 
The advantage of data marts include:: low cost 
(Prices under $100,000 versus $1million or more for 
data warehouses); significantly shorter lead time for 
implementation (often less than 90 days), local rather 
than central control (conferring power on the using 
group), More rapid response and more easily 
understood and navigated than an enterprise wide 
data warehouse . 
“ Copyright 2005 John Wiley & Sons Inc.” Chapter 3 
13
3.3 Information & Knowledge Discovery with 
Business Intelligence 
 Business Intelligence: A broad category of 
applications and techniques for gathering, 
storing, analyzing , and providing access to 
data to help enterprise users make better 
business and strategic decisions. 
“ Copyright 2005 John Wiley & Sons Inc.” Chapter 3 
14
How Business Intelligence works? 
“ Copyright 2005 John Wiley & Sons Inc.” Chapter 3 
15
The Tools and techniques of business intelligence 
 The major application include the activities of 
query and reporting, online analytical 
processing, decision support , data mining, 
forecasting, and statistical analysis. 
 BI tools are divided into two major categories: 
 (1) information and knowledge discovery 
 (2) decision support and intelligent analysis. 
“ Copyright 2005 John Wiley & Sons Inc.” Chapter 3 
16
Categories of business intelligence 
“ Copyright 2005 John Wiley & Sons Inc.” Chapter 3 
17
Knowledge Discovery (KD) 
 The process of extracting knowledge from 
volumes of data; includes data mining . 
“ Copyright 2005 John Wiley & Sons Inc.” Chapter 3 
18
Stage in the evolution of knowledge discovery 
Evolutionary stage Business question enabling technologies characteristic 
Data collection(1980s) What was my total revenue 
in the last 5 years? 
Computers ,tapes , disks Retrospective , static data 
“ Copyright 2005 John Wiley & Sons Inc.” Chapter 3 
delivery 
Data access (1980s) What were unit sales in new 
England last March ? 
Relational databases 
(RDBMS), structured query 
language (SQL) 
Retrospective , dynamic 
data delivery at record level 
Data warehousing and 
decision support (early 
1990s) 
What were the sales in 
region A by product , by 
salesperson? 
OLAP, multidimensional 
databases, data 
warehouses 
Retrospective , proactive 
data delivery at multiple 
level 
Intelligent data mining 
(late 1990s) 
What’s likely to happen to 
the tBoston unit’s sales next 
month ? Why? 
Advanced algorithms, 
multiprocessor computers, 
massive databases 
Prospective , proactive 
information delivery 
Advanced intelligent 
systems; complete 
integration(2000-2004) 
What is the best plan to 
follow? how did we perform 
compared to metrics? 
Neural computing advanced 
al models, complex 
optimization, web services 
Proactive , integrative ; 
multiple business partners 
19
3.4 Data Mining Concepts 
Data mining: The process of searching for 
valuable business information in a large 
database, data warehouse, or data mart. 
Data mining capabilities include: 
1) Automated prediction of trends and 
behaviours, and 
2) Automated discovery of previously 
unknown patterns. 
“ Copyright 2005 John Wiley & Sons Inc.” Chapter 3 
20
Data Mining Application 
Retailing and sales 
Banking 
Manufacturing and production 
Insurance 
Police work 
Health care 
Marketing 
“ Copyright 2005 John Wiley & Sons Inc.” Chapter 3 
21
Text Mining 
The application of data mining to non-structured 
or less-structured text files. 
Text mining helps organizations to do the 
following (1) find the ‘’hidden’’ content of 
documents, including additional useful 
relationship and (2) group documents by 
common themes (e.g., identity all the 
customers of an insurance firm who have 
similar complaints). 
“ Copyright 2005 John Wiley & Sons Inc.” Chapter 3 
22
Web Mining 
The application of data mining techniques to discover 
actionable and meaningful patterns, profiles , and 
trends form web resources. 
Web mining is used in the following areas: 
information filtering, surveillance, mining of web-access 
logs for analyzing usage, assisted browsing, 
and services that fight crime on the internet . 
Web mining can perform the following function : 
Resource discovery 
Information extraction 
Generalization 
“ Copyright 2005 John Wiley & Sons Inc.” Chapter 3 
23
3.5 Data Visualization Technologies 
Data Visualization: Visual presentation of 
data by technologies such as graphics, 
multidimensional tables and graphs, videos 
and animation, and other multimedia formats. 
“ Copyright 2005 John Wiley & Sons Inc.” Chapter 3 
24
Geographical Information System (GIS) 
 A computer- based system for capturing, 
storing, checking, integrating, manipulating, 
and displaying data using digitized maps. 
“ Copyright 2005 John Wiley & Sons Inc.” Chapter 3 
25
Visual Interactive Model and Simulation 
Visual Interactive Modeling (VIM):The use of 
computer graphic displays to represent the 
impact of different management or 
operational decisions on goals such as profit 
or market share. 
Visual Interactive Simulation (VIS): A visual 
interactive modeling method in which the end 
user watches the progress of the simulation 
model in an animated form, using graphics 
terminals. 
“ Copyright 2005 John Wiley & Sons Inc.” Chapter 3 
26
Virtual Reality (VR) 
Interactive, computer-generated, three-dimensional 
graphics delivered to the user 
through a head- mounted display. 
Virtual reality and the web. A platform-independent 
standard for VR called virtual 
reality mark up language (VRML) makes 
navigation through online supermarkets, 
museums, and stores as interacting with 
textual information. 
“ Copyright 2005 John Wiley & Sons Inc.” Chapter 3 
27
3.6 Web-based Data Management 
System 
“ Copyright 2005 John Wiley & Sons Inc.” Chapter 3 
28
3.7 Knowledge Management 
Knowledge: Information that is contextual, 
relevant, and actionable . 
Intellectual capital (intellectual assets): other 
terms for knowledge. 
“ Copyright 2005 John Wiley & Sons Inc.” Chapter 3 
29
Knowledge Management (KM) 
A process that helps organizations identify, 
select, organize, disseminate, transfer, and 
apply information and expertise that are part 
of the organization’s memory and that 
typically reside within the organization in an 
unstructured manner 
“ Copyright 2005 John Wiley & Sons Inc.” Chapter 3 
30
Chief Knowledge Officer (CKO) 
Executive whose objectives are to maximize 
the firm’s knowledge assets, design and 
implement knowledge management 
strategies, and effectively exchange 
knowledge asset internally and externally . 
Community of practice: A group of people in 
an organization with a common professional 
interest. 
“ Copyright 2005 John Wiley & Sons Inc.” Chapter 3 
31
Knowledge Management cont… 
 Explicit Knowledge: The more objective, 
rational, and technical types of knowledge 
 Tacit knowledge: The cumulative store of 
subjective or experiential learning; it is highly 
personal and hard to formalize. 
 Knowledge management systems (KMSs): 
Information technologies used to systematize, 
enhance, and expedite intra- and interfirm 
knowledge management. 
“ Copyright 2005 John Wiley & Sons Inc.” Chapter 3 
32
The Knowledge Management System Cycle 
Create knowledge . Knowledge is created as people determine 
new ways of doing thing or develop know-how. Sometimes 
external knowledge is brought in. 
Capture knowledge. New knowledge must be identified as 
valuable and be represented in a reasonable way. 
Refine knowledge. New knowledge must be placed in context so 
that it is actionable . This is where human insight (tacit qualities) 
must be captured along with explicit facts. 
Store knowledge. Useful knowledge must then be stored in a 
repository so that others in the organization can access it. 
Manage knowledge. Like a library, the knowledge must be kept 
current. It must be reviewed to verify that it is relevant and 
accurate. 
Disseminate knowledge. Knowledge must be made available in 
a useful format to anyone in the organization who needs it, 
anywhere and any time. 
“ Copyright 2005 John Wiley & Sons Inc.” Chapter 3 
33
3.8 IT in Knowledge Management 
Communication technologies: allow users to access needed 
knowledge, and to communicate with each other- especially with 
experts .E-mail, the Internet, corporate intranets, and other web 
based tools provide communication capabilities. 
Collaboration technologies: provide the means to perform group 
work. Collaborative computing capabilities such as electronic 
brainstorming enhance group work especially for knowledge 
contribution . 
Storage and retrieval technologies: originally meant using a 
database management system to store and manage explicit 
knowledge . Electronic document management system and 
specialized storage system that are part of collaborative 
computing system are the tools used to capture, store, and 
manage tacit knowledge . 
“ Copyright 2005 John Wiley & Sons Inc.” Chapter 3 
34
Technologies Supporting Knowledge Management 
Artificial intelligence. The study of human 
thought processes and the representation of 
those processes in machines. 
Intelligent Agents. Work and provide 
assistance in their daily tasks. 
Knowledge Discovery in Databases. A 
process used to search for and extract useful 
information from volumes of documents and 
data. 
“ Copyright 2005 John Wiley & Sons Inc.” Chapter 3 
35
Seven Knowledge Management Tools 
Tool Description Vendor/Product 
“ Copyright 2005 John Wiley & Sons Inc.” Chapter 3 
Examples 
Collaboration computing Groupware products; used to enhance 
tacit knowledge transfer within an 
organization 
Group systems; Lotus Notes / Domino 
Knowledge server Contain the main knowledge management 
software, including the knowledge 
repository; provides access to other 
knowledge information , and data. 
Hummingbird knowledge server; 
Autonomy’s intelligent data operating layer 
(IDOL) 
Enterprise knowledge portal Presents a single access point into a 
knowledge management system ‘ 
organizes the sources of unstructured 
information in an organization . 
Plum tree; Hyper wave 
Electronic document management Allows users to access needed documents 
over a corporate intranet; allows electronic 
collaboration on document creation and 
revision. 
Doc Share; Lotus Notes 
Knowledge –harvesting tools Capture organizational knowledge 
unobtrusively; may be embedded in a 
knowledge management system. 
Knowledge Mail ; Active Knowledge 
Search engines Locate and retrieve documents from vast 
collections in corporate repositories . 
Google: Verity ; Inktomi 
Knowledge management suites Integrate communications, collaboration, 
and storage technologies in one complete, 
out-of- the- box solution 
Web Sphere; knowledge X 
36
All rights reserved. Reproduction or translation of this 
work beyond that permitted in section 117 of the United 
States Copyright Act without express permission of the 
copyright owner is unlawful. Request for information 
should be addressed to the permission department, John 
Wiley & Sons, Inc. The purchaser may make back-up 
copies for his/her own use only and not for distribution or 
resale. The publisher assumes no responsibility for error, 
omissions, or damages caused by the use of these 
programs or from the use of the information herein. 
“ Copyright 2005 John Wiley & Sons Inc.” Chapter 3

More Related Content

What's hot

A Survey on Data Mining
A Survey on Data MiningA Survey on Data Mining
A Survey on Data MiningIOSR Journals
 
Data Mining in the World of BIG Data-A Survey
Data Mining in the World of BIG Data-A SurveyData Mining in the World of BIG Data-A Survey
Data Mining in the World of BIG Data-A SurveyEditor IJCATR
 
Introduction to Big Data
Introduction to Big DataIntroduction to Big Data
Introduction to Big DataAkshata Humbe
 
An Comprehensive Study of Big Data Environment and its Challenges.
An Comprehensive Study of Big Data Environment and its Challenges.An Comprehensive Study of Big Data Environment and its Challenges.
An Comprehensive Study of Big Data Environment and its Challenges.ijceronline
 
BIG DATA IN CLOUD COMPUTING REVIEW AND OPPORTUNITIES
BIG DATA IN CLOUD COMPUTING REVIEW AND OPPORTUNITIESBIG DATA IN CLOUD COMPUTING REVIEW AND OPPORTUNITIES
BIG DATA IN CLOUD COMPUTING REVIEW AND OPPORTUNITIESijcsit
 
What is Information System - Miechael 20190700004
What is Information System - Miechael 20190700004What is Information System - Miechael 20190700004
What is Information System - Miechael 20190700004MiechaelMaikel
 
Big Data Analytics for Dodd-Frank
Big Data Analytics for Dodd-FrankBig Data Analytics for Dodd-Frank
Big Data Analytics for Dodd-FrankDataWorks Summit
 
Big Data, NoSQL, NewSQL & The Future of Data Management
Big Data, NoSQL, NewSQL & The Future of Data ManagementBig Data, NoSQL, NewSQL & The Future of Data Management
Big Data, NoSQL, NewSQL & The Future of Data ManagementTony Bain
 
Data Mining and Big Data Challenges and Research Opportunities
Data Mining and Big Data Challenges and Research OpportunitiesData Mining and Big Data Challenges and Research Opportunities
Data Mining and Big Data Challenges and Research OpportunitiesKathirvel Ayyaswamy
 
A frame work for data warehouse for nigerian police force
A frame work for data warehouse for nigerian police forceA frame work for data warehouse for nigerian police force
A frame work for data warehouse for nigerian police forceAlexander Decker
 
IRJET- Analysis of Big Data Technology and its Challenges
IRJET- Analysis of Big Data Technology and its ChallengesIRJET- Analysis of Big Data Technology and its Challenges
IRJET- Analysis of Big Data Technology and its ChallengesIRJET Journal
 

What's hot (18)

A Survey on Data Mining
A Survey on Data MiningA Survey on Data Mining
A Survey on Data Mining
 
Data Mining in the World of BIG Data-A Survey
Data Mining in the World of BIG Data-A SurveyData Mining in the World of BIG Data-A Survey
Data Mining in the World of BIG Data-A Survey
 
Introduction to Big Data
Introduction to Big DataIntroduction to Big Data
Introduction to Big Data
 
Data Management
Data ManagementData Management
Data Management
 
An Comprehensive Study of Big Data Environment and its Challenges.
An Comprehensive Study of Big Data Environment and its Challenges.An Comprehensive Study of Big Data Environment and its Challenges.
An Comprehensive Study of Big Data Environment and its Challenges.
 
BIG DATA IN CLOUD COMPUTING REVIEW AND OPPORTUNITIES
BIG DATA IN CLOUD COMPUTING REVIEW AND OPPORTUNITIESBIG DATA IN CLOUD COMPUTING REVIEW AND OPPORTUNITIES
BIG DATA IN CLOUD COMPUTING REVIEW AND OPPORTUNITIES
 
Big Data Analytics
Big Data AnalyticsBig Data Analytics
Big Data Analytics
 
What is Information System - Miechael 20190700004
What is Information System - Miechael 20190700004What is Information System - Miechael 20190700004
What is Information System - Miechael 20190700004
 
Big Data Analytics for Dodd-Frank
Big Data Analytics for Dodd-FrankBig Data Analytics for Dodd-Frank
Big Data Analytics for Dodd-Frank
 
Big data assignment
Big data assignmentBig data assignment
Big data assignment
 
Information_Systems
Information_SystemsInformation_Systems
Information_Systems
 
Big Data, NoSQL, NewSQL & The Future of Data Management
Big Data, NoSQL, NewSQL & The Future of Data ManagementBig Data, NoSQL, NewSQL & The Future of Data Management
Big Data, NoSQL, NewSQL & The Future of Data Management
 
Data Mining and Big Data Challenges and Research Opportunities
Data Mining and Big Data Challenges and Research OpportunitiesData Mining and Big Data Challenges and Research Opportunities
Data Mining and Big Data Challenges and Research Opportunities
 
A frame work for data warehouse for nigerian police force
A frame work for data warehouse for nigerian police forceA frame work for data warehouse for nigerian police force
A frame work for data warehouse for nigerian police force
 
IRJET- Analysis of Big Data Technology and its Challenges
IRJET- Analysis of Big Data Technology and its ChallengesIRJET- Analysis of Big Data Technology and its Challenges
IRJET- Analysis of Big Data Technology and its Challenges
 
Big Data analytics
Big Data analyticsBig Data analytics
Big Data analytics
 
Visual Data Mining
Visual Data MiningVisual Data Mining
Visual Data Mining
 
Big data
Big dataBig data
Big data
 

Viewers also liked (16)

Tg01
Tg01Tg01
Tg01
 
Ch04
Ch04Ch04
Ch04
 
Ch08
Ch08Ch08
Ch08
 
Ch11
Ch11Ch11
Ch11
 
Ch06
Ch06Ch06
Ch06
 
Ch09
Ch09Ch09
Ch09
 
Tg03
Tg03Tg03
Tg03
 
Ch10
Ch10Ch10
Ch10
 
Ch07
Ch07Ch07
Ch07
 
Ch05
Ch05Ch05
Ch05
 
Ch01
Ch01Ch01
Ch01
 
Ch12
Ch12Ch12
Ch12
 
Ch01
Ch01Ch01
Ch01
 
Ch02
Ch02Ch02
Ch02
 
aaaaaa
aaaaaaaaaaaa
aaaaaa
 
I ch12
I ch12I ch12
I ch12
 

Similar to Ch03

Social network architecture - Part 3. Big data - Machine learning
Social network architecture - Part 3. Big data - Machine learningSocial network architecture - Part 3. Big data - Machine learning
Social network architecture - Part 3. Big data - Machine learningPhu Luong Trong
 
Introduction to big data
Introduction to big dataIntroduction to big data
Introduction to big dataHari Priya
 
Big Data in Distributed Analytics,Cybersecurity And Digital Forensics
Big Data in Distributed Analytics,Cybersecurity And Digital ForensicsBig Data in Distributed Analytics,Cybersecurity And Digital Forensics
Big Data in Distributed Analytics,Cybersecurity And Digital ForensicsSherinMariamReji05
 
Database Systems
Database SystemsDatabase Systems
Database SystemsUsman Tariq
 
Advanced Analytics and Machine Learning with Data Virtualization
Advanced Analytics and Machine Learning with Data VirtualizationAdvanced Analytics and Machine Learning with Data Virtualization
Advanced Analytics and Machine Learning with Data VirtualizationDenodo
 
TOPIC.pptx
TOPIC.pptxTOPIC.pptx
TOPIC.pptxinfinix8
 
Data science.chapter-1,2,3
Data science.chapter-1,2,3Data science.chapter-1,2,3
Data science.chapter-1,2,3varshakumar21
 
Business Intelligence and Analytics Unit-2 part-A .pptx
Business Intelligence and Analytics Unit-2 part-A .pptxBusiness Intelligence and Analytics Unit-2 part-A .pptx
Business Intelligence and Analytics Unit-2 part-A .pptxRupaRani28
 
Data Integration Alternatives: When to use Data Virtualization, ETL, and ESB
Data Integration Alternatives: When to use Data Virtualization, ETL, and ESBData Integration Alternatives: When to use Data Virtualization, ETL, and ESB
Data Integration Alternatives: When to use Data Virtualization, ETL, and ESBDenodo
 
Application Of A New Database Management System
Application Of A New Database Management SystemApplication Of A New Database Management System
Application Of A New Database Management SystemPamela Wright
 

Similar to Ch03 (20)

Social network architecture - Part 3. Big data - Machine learning
Social network architecture - Part 3. Big data - Machine learningSocial network architecture - Part 3. Big data - Machine learning
Social network architecture - Part 3. Big data - Machine learning
 
Introduction to big data
Introduction to big dataIntroduction to big data
Introduction to big data
 
AIS 3 - EDITED.pdf
AIS 3 - EDITED.pdfAIS 3 - EDITED.pdf
AIS 3 - EDITED.pdf
 
Lecture1-IS322(Data&InfoMang-introduction)
Lecture1-IS322(Data&InfoMang-introduction)Lecture1-IS322(Data&InfoMang-introduction)
Lecture1-IS322(Data&InfoMang-introduction)
 
Lecture1 is322 data&infomanag(introduction)(old curr)
Lecture1 is322 data&infomanag(introduction)(old curr)Lecture1 is322 data&infomanag(introduction)(old curr)
Lecture1 is322 data&infomanag(introduction)(old curr)
 
Lecture1 is322 data&infomanag(introduction)(old curr)
Lecture1 is322 data&infomanag(introduction)(old curr)Lecture1 is322 data&infomanag(introduction)(old curr)
Lecture1 is322 data&infomanag(introduction)(old curr)
 
Unit 5
Unit 5 Unit 5
Unit 5
 
Big Data in Distributed Analytics,Cybersecurity And Digital Forensics
Big Data in Distributed Analytics,Cybersecurity And Digital ForensicsBig Data in Distributed Analytics,Cybersecurity And Digital Forensics
Big Data in Distributed Analytics,Cybersecurity And Digital Forensics
 
Abstract
AbstractAbstract
Abstract
 
Chapter 03 it-8ed-volonino
Chapter 03 it-8ed-voloninoChapter 03 it-8ed-volonino
Chapter 03 it-8ed-volonino
 
Dm unit i r16
Dm unit i   r16Dm unit i   r16
Dm unit i r16
 
Database Systems
Database SystemsDatabase Systems
Database Systems
 
Advanced Analytics and Machine Learning with Data Virtualization
Advanced Analytics and Machine Learning with Data VirtualizationAdvanced Analytics and Machine Learning with Data Virtualization
Advanced Analytics and Machine Learning with Data Virtualization
 
TOPIC.pptx
TOPIC.pptxTOPIC.pptx
TOPIC.pptx
 
Unit 2
Unit 2Unit 2
Unit 2
 
Data science.chapter-1,2,3
Data science.chapter-1,2,3Data science.chapter-1,2,3
Data science.chapter-1,2,3
 
Business Intelligence and Analytics Unit-2 part-A .pptx
Business Intelligence and Analytics Unit-2 part-A .pptxBusiness Intelligence and Analytics Unit-2 part-A .pptx
Business Intelligence and Analytics Unit-2 part-A .pptx
 
Bigdata
Bigdata Bigdata
Bigdata
 
Data Integration Alternatives: When to use Data Virtualization, ETL, and ESB
Data Integration Alternatives: When to use Data Virtualization, ETL, and ESBData Integration Alternatives: When to use Data Virtualization, ETL, and ESB
Data Integration Alternatives: When to use Data Virtualization, ETL, and ESB
 
Application Of A New Database Management System
Application Of A New Database Management SystemApplication Of A New Database Management System
Application Of A New Database Management System
 

Recently uploaded

🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 

Recently uploaded (20)

🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 

Ch03

  • 1. Introduction to Information Technology Turban, Rainer and Potter John Wiley & Sons, Inc. Copyright 2005 Chapter 3
  • 2. Data and Knowledge Management “ Copyright 2005 John Wiley & Sons Inc.” 1 Chapter 3
  • 3. Chapter Outline Data Management: A Critical Success Factor Data Warehousing Information and Knowledge Discovery with Business Intelligence Data Mining Concepts and Applications Data Visualization Technologies Web-Based Data Management Systems Introduction to Knowledge Management Information Technology in Knowledge Management “ Copyright 2005 John Wiley & Sons Inc.” Chapter 3 2
  • 4. Learning Objectives Recognize the importance of data, managerial issues, and life cycle . Describe the sources of data and their collection Describe document management systems. Explain the operation of data warehousing and its role in decision support Describe information and knowledge discovery and business intelligence Understand the power and benefits of data mining. Describe data presentation methods, and explain geographical information systems, visual simulations, and virtual reality as decision support tools Recognize the role of the web in data management. Define knowledge and describe the different types of knowledge. Describe the technologies that can be utilized in a knowledge management system “ Copyright 2005 John Wiley & Sons Inc.” Chapter 3 3
  • 5. 3.1 Data Management  A critical success factor: IT applications cannot be done without using data. Data should be high-quality (accurate, complete, timely, consistent, accessible, relevant, and concise).  The Difficulties of managing Data: • The amount of data increases exponentially with time • Data are scattered throughout organization and are collected by many individuals using several methods and devices. • An ever- increasing amount of external data needs to be considered in making organizational decisions. • Data security, quality, and integrity are critical, yet are easily jeopardized. “ Copyright 2005 John Wiley & Sons Inc.” Chapter 3 4
  • 6. Critical Success Factors (CSF) Those few things that must go right in to ensure an organization’s survival and success “ Copyright 2005 John Wiley & Sons Inc.” Chapter 3 5
  • 7. Data Life Cycle “ Copyright 2005 John Wiley & Sons Inc.” Chapter 3 6
  • 8. Data Sources  Internal Data Sources: data about people, products, services, and processes.  Personal Data: IS users or other corporate employees may document their own expertise by creating personal data.  External Data Sources: Data from commercial databases to sensors and satellites. “ Copyright 2005 John Wiley & Sons Inc.” Chapter 3 7
  • 9. Document Management  The automated control of electronic documents, page images, spreadsheets, word processing documents, and other complex documents through their entire life cycle within organization.  The major tools of document management are workflow software, authoring tools, scanners, imaging systems, and database.  Document Management Systems (DMSs): Computer systems that identify store, retrieve, track, and present information in an electronic format to decision makers “ Copyright 2005 John Wiley & Sons Inc.” Chapter 3 8
  • 10. 3.2 Data Warehousing  Transaction Processing: The data are organized in hierarchical structure and centrally processed  Analytical Processing: Analysis of accumulated data  Data Warehouse: A repository of subject-oriented historical data that are organized to be accessible in a form readily acceptable for analytical processing. “ Copyright 2005 John Wiley & Sons Inc.” Chapter 3 9
  • 11. Characteristics of a Data Warehouse Organization. Data are organized by subject and contain information relevant for decision support only . Consistency. Data in different operational databases may be encoded differently . In the data warehouse, though, they will be coded in a consistent manner. Time variant. The data are kept for many years so that they can be used for trends, forecasting, and comparisons over time. Non-volatile. Data are not updated once entered into the warehouse. Multidimensional. Typically the data warehouse uses a multidimensional structure . Web-based. Today’s data warehouse are designed to provide an efficient computing environment for web-based applications. “ Copyright 2005 John Wiley & Sons Inc.” Chapter 3 10
  • 12. Building a Data Warehouse “ Copyright 2005 John Wiley & Sons Inc.” Chapter 3 11
  • 13. Relational and Multidimensional Database  Relational databases store data in two – dimensional tables. Multidimensional databases typically store data in arrays, which consist of at least three business dimension. “ Copyright 2005 John Wiley & Sons Inc.” Chapter 3 12
  • 14. Data Marts Data Mart: A small data warehouse designed for a strategic business unit ( SBU) or a department The advantage of data marts include:: low cost (Prices under $100,000 versus $1million or more for data warehouses); significantly shorter lead time for implementation (often less than 90 days), local rather than central control (conferring power on the using group), More rapid response and more easily understood and navigated than an enterprise wide data warehouse . “ Copyright 2005 John Wiley & Sons Inc.” Chapter 3 13
  • 15. 3.3 Information & Knowledge Discovery with Business Intelligence  Business Intelligence: A broad category of applications and techniques for gathering, storing, analyzing , and providing access to data to help enterprise users make better business and strategic decisions. “ Copyright 2005 John Wiley & Sons Inc.” Chapter 3 14
  • 16. How Business Intelligence works? “ Copyright 2005 John Wiley & Sons Inc.” Chapter 3 15
  • 17. The Tools and techniques of business intelligence  The major application include the activities of query and reporting, online analytical processing, decision support , data mining, forecasting, and statistical analysis.  BI tools are divided into two major categories:  (1) information and knowledge discovery  (2) decision support and intelligent analysis. “ Copyright 2005 John Wiley & Sons Inc.” Chapter 3 16
  • 18. Categories of business intelligence “ Copyright 2005 John Wiley & Sons Inc.” Chapter 3 17
  • 19. Knowledge Discovery (KD)  The process of extracting knowledge from volumes of data; includes data mining . “ Copyright 2005 John Wiley & Sons Inc.” Chapter 3 18
  • 20. Stage in the evolution of knowledge discovery Evolutionary stage Business question enabling technologies characteristic Data collection(1980s) What was my total revenue in the last 5 years? Computers ,tapes , disks Retrospective , static data “ Copyright 2005 John Wiley & Sons Inc.” Chapter 3 delivery Data access (1980s) What were unit sales in new England last March ? Relational databases (RDBMS), structured query language (SQL) Retrospective , dynamic data delivery at record level Data warehousing and decision support (early 1990s) What were the sales in region A by product , by salesperson? OLAP, multidimensional databases, data warehouses Retrospective , proactive data delivery at multiple level Intelligent data mining (late 1990s) What’s likely to happen to the tBoston unit’s sales next month ? Why? Advanced algorithms, multiprocessor computers, massive databases Prospective , proactive information delivery Advanced intelligent systems; complete integration(2000-2004) What is the best plan to follow? how did we perform compared to metrics? Neural computing advanced al models, complex optimization, web services Proactive , integrative ; multiple business partners 19
  • 21. 3.4 Data Mining Concepts Data mining: The process of searching for valuable business information in a large database, data warehouse, or data mart. Data mining capabilities include: 1) Automated prediction of trends and behaviours, and 2) Automated discovery of previously unknown patterns. “ Copyright 2005 John Wiley & Sons Inc.” Chapter 3 20
  • 22. Data Mining Application Retailing and sales Banking Manufacturing and production Insurance Police work Health care Marketing “ Copyright 2005 John Wiley & Sons Inc.” Chapter 3 21
  • 23. Text Mining The application of data mining to non-structured or less-structured text files. Text mining helps organizations to do the following (1) find the ‘’hidden’’ content of documents, including additional useful relationship and (2) group documents by common themes (e.g., identity all the customers of an insurance firm who have similar complaints). “ Copyright 2005 John Wiley & Sons Inc.” Chapter 3 22
  • 24. Web Mining The application of data mining techniques to discover actionable and meaningful patterns, profiles , and trends form web resources. Web mining is used in the following areas: information filtering, surveillance, mining of web-access logs for analyzing usage, assisted browsing, and services that fight crime on the internet . Web mining can perform the following function : Resource discovery Information extraction Generalization “ Copyright 2005 John Wiley & Sons Inc.” Chapter 3 23
  • 25. 3.5 Data Visualization Technologies Data Visualization: Visual presentation of data by technologies such as graphics, multidimensional tables and graphs, videos and animation, and other multimedia formats. “ Copyright 2005 John Wiley & Sons Inc.” Chapter 3 24
  • 26. Geographical Information System (GIS)  A computer- based system for capturing, storing, checking, integrating, manipulating, and displaying data using digitized maps. “ Copyright 2005 John Wiley & Sons Inc.” Chapter 3 25
  • 27. Visual Interactive Model and Simulation Visual Interactive Modeling (VIM):The use of computer graphic displays to represent the impact of different management or operational decisions on goals such as profit or market share. Visual Interactive Simulation (VIS): A visual interactive modeling method in which the end user watches the progress of the simulation model in an animated form, using graphics terminals. “ Copyright 2005 John Wiley & Sons Inc.” Chapter 3 26
  • 28. Virtual Reality (VR) Interactive, computer-generated, three-dimensional graphics delivered to the user through a head- mounted display. Virtual reality and the web. A platform-independent standard for VR called virtual reality mark up language (VRML) makes navigation through online supermarkets, museums, and stores as interacting with textual information. “ Copyright 2005 John Wiley & Sons Inc.” Chapter 3 27
  • 29. 3.6 Web-based Data Management System “ Copyright 2005 John Wiley & Sons Inc.” Chapter 3 28
  • 30. 3.7 Knowledge Management Knowledge: Information that is contextual, relevant, and actionable . Intellectual capital (intellectual assets): other terms for knowledge. “ Copyright 2005 John Wiley & Sons Inc.” Chapter 3 29
  • 31. Knowledge Management (KM) A process that helps organizations identify, select, organize, disseminate, transfer, and apply information and expertise that are part of the organization’s memory and that typically reside within the organization in an unstructured manner “ Copyright 2005 John Wiley & Sons Inc.” Chapter 3 30
  • 32. Chief Knowledge Officer (CKO) Executive whose objectives are to maximize the firm’s knowledge assets, design and implement knowledge management strategies, and effectively exchange knowledge asset internally and externally . Community of practice: A group of people in an organization with a common professional interest. “ Copyright 2005 John Wiley & Sons Inc.” Chapter 3 31
  • 33. Knowledge Management cont…  Explicit Knowledge: The more objective, rational, and technical types of knowledge  Tacit knowledge: The cumulative store of subjective or experiential learning; it is highly personal and hard to formalize.  Knowledge management systems (KMSs): Information technologies used to systematize, enhance, and expedite intra- and interfirm knowledge management. “ Copyright 2005 John Wiley & Sons Inc.” Chapter 3 32
  • 34. The Knowledge Management System Cycle Create knowledge . Knowledge is created as people determine new ways of doing thing or develop know-how. Sometimes external knowledge is brought in. Capture knowledge. New knowledge must be identified as valuable and be represented in a reasonable way. Refine knowledge. New knowledge must be placed in context so that it is actionable . This is where human insight (tacit qualities) must be captured along with explicit facts. Store knowledge. Useful knowledge must then be stored in a repository so that others in the organization can access it. Manage knowledge. Like a library, the knowledge must be kept current. It must be reviewed to verify that it is relevant and accurate. Disseminate knowledge. Knowledge must be made available in a useful format to anyone in the organization who needs it, anywhere and any time. “ Copyright 2005 John Wiley & Sons Inc.” Chapter 3 33
  • 35. 3.8 IT in Knowledge Management Communication technologies: allow users to access needed knowledge, and to communicate with each other- especially with experts .E-mail, the Internet, corporate intranets, and other web based tools provide communication capabilities. Collaboration technologies: provide the means to perform group work. Collaborative computing capabilities such as electronic brainstorming enhance group work especially for knowledge contribution . Storage and retrieval technologies: originally meant using a database management system to store and manage explicit knowledge . Electronic document management system and specialized storage system that are part of collaborative computing system are the tools used to capture, store, and manage tacit knowledge . “ Copyright 2005 John Wiley & Sons Inc.” Chapter 3 34
  • 36. Technologies Supporting Knowledge Management Artificial intelligence. The study of human thought processes and the representation of those processes in machines. Intelligent Agents. Work and provide assistance in their daily tasks. Knowledge Discovery in Databases. A process used to search for and extract useful information from volumes of documents and data. “ Copyright 2005 John Wiley & Sons Inc.” Chapter 3 35
  • 37. Seven Knowledge Management Tools Tool Description Vendor/Product “ Copyright 2005 John Wiley & Sons Inc.” Chapter 3 Examples Collaboration computing Groupware products; used to enhance tacit knowledge transfer within an organization Group systems; Lotus Notes / Domino Knowledge server Contain the main knowledge management software, including the knowledge repository; provides access to other knowledge information , and data. Hummingbird knowledge server; Autonomy’s intelligent data operating layer (IDOL) Enterprise knowledge portal Presents a single access point into a knowledge management system ‘ organizes the sources of unstructured information in an organization . Plum tree; Hyper wave Electronic document management Allows users to access needed documents over a corporate intranet; allows electronic collaboration on document creation and revision. Doc Share; Lotus Notes Knowledge –harvesting tools Capture organizational knowledge unobtrusively; may be embedded in a knowledge management system. Knowledge Mail ; Active Knowledge Search engines Locate and retrieve documents from vast collections in corporate repositories . Google: Verity ; Inktomi Knowledge management suites Integrate communications, collaboration, and storage technologies in one complete, out-of- the- box solution Web Sphere; knowledge X 36
  • 38. All rights reserved. Reproduction or translation of this work beyond that permitted in section 117 of the United States Copyright Act without express permission of the copyright owner is unlawful. Request for information should be addressed to the permission department, John Wiley & Sons, Inc. The purchaser may make back-up copies for his/her own use only and not for distribution or resale. The publisher assumes no responsibility for error, omissions, or damages caused by the use of these programs or from the use of the information herein. “ Copyright 2005 John Wiley & Sons Inc.” Chapter 3

Editor's Notes

  1. 1
  2. 2
  3. 5
  4. 38