SlideShare a Scribd company logo
Part II. Data and Network Infrastructure



                                         C hapter 3
                                         Data, Text, and
                                         Document Management



                  M a n a g e m e n t I n fo r m a t i o n S y s te m s
                  EIMBA




Copyright 2012 John Wiley & Sons, Inc.
                                                                                    3-1
Chapter 3 Outline

3.1 Data, Text, and Document Management

3.2 File Management Systems

3.3 Database Management Systems

3.4 Data Warehouses, Data Marts, and Data Centers

3.5 Enterprise Content Management



Copyright 2012 John Wiley & Sons, Inc.
                                                    3-2
Chapter 3 Learning Objectives
    Describe data, text, and document
     management, and their impacts on performance.
    Understand file management systems.
    Understand the functions of databases and
     database management systems.
    Describe the tactical and strategic benefits of data
     warehouses, data marts, and data centers.



Copyright 2012 John Wiley & Sons, Inc.
                                                            3-3
For Class Discussion & Debate
       Wendy's International Relies on Text Mining for
       Customer Experience Management


Scenario for Brainstorming & Discussion (see book for full text)
    1. Select an industry, company, or public sector.
    2. Identify costs due to ignorance about customers’ or
       constituents’ experiences.
    3. Explain how your selection could benefit from text
       analytics that provided feedback within 24 hours.
    4. Compare and assess your answers with others in class.


 Copyright 2012 John Wiley & Sons, Inc.
                                                               3-4
Debate (see book for full text)

       • Select one side of the argument, as described in
         the textbook.
       • Debate whether investments in text message
         collection and mining should be made even if no
         ROI can be determined in advance.
       • Provide convincing arguments either in favor of
         or against the investment in text message
         collection and mining.


Copyright 2012 John Wiley & Sons, Inc.
                                                        3-5
3.1 Data, Text, and Document Management

     Data, text, and documents are strategic assets. Vast
     quantities are:
      • created and collected
      • then stored – often in 5 or more locations
     Data, text, and document management helps
     companies improve productivity by insuring that
     people can find what they need without having to
     conduct a long and difficult search.



Copyright 2012 John Wiley & Sons, Inc.
                                                            3-6
Data Management
Why does data management matter?
  • No enterprise can be effective without high quality data
     that is accessible when needed.
       • Data that’s incomplete or out of context cannot be trusted.
       • Organizations with at least 1,000 knowledge workers lose
         ~ $5.7 million annually in time wasted by employees
         reformatting data as they move among applications.
What is the goal of data management?
  • To provide the infrastructure and tools to transform raw
     data into usable information of the highest quality.



Copyright 2012 John Wiley & Sons, Inc.
                                                                  3-7
Data Management
Why is data management difficult and expensive?
       • Volume of data is increasing exponentially.

       • Data is scattered throughout the organization.

       • Data is created and used offline without going through
         quality control checks.

       • Data may be redundant and out-of-date, creating a huge
         maintenance problem.



Copyright 2012 John Wiley & Sons, Inc.
                                                                  3-8
Data Management
      Current key issues

          Master data management (MDM): Processes to integrate
           data from various sources and enterprise apps in order to
           create a unified view of the data.

          Document management system (DMS): Hardware and
           software to manage, archive, and purge files and other
           electronic documents (e-documents).

          Green computing: Efforts to conserve natural resources
           and reduce effects of computer usage on the
           environment.




Copyright 2012 John Wiley & Sons, Inc.
                                                                       3-9
IT at Work 3.1 – Healthcare Sector
Data Errors Cost Billions of Dollars and Put Lives at Risk

    Every day, healthcare administrators and others throughout
     the healthcare supply chain waste 24% --30% of their time
     correcting data errors.

    Each incorrect transaction costs $60 to $80 to correct.

    About 60% of all invoices among supply chain partners have
     errors, and each invoice error costs $40 to $400 to reconcile.

    Each year, billions of dollars are wasted in the healthcare
     supply chain because of supply chain data disconnects.


Copyright 2012 John Wiley & Sons, Inc.
                                                                   3-10
IT at Work 3.1 (continued)
Data Errors Cost Billions of Dollars and Put Lives at Risk
     Benefits from data synchronization in the healthcare sector
     and supply chair:
      • Easier and faster product sourcing because of accurate
        and consistent item information
       • Significantly reduces the amount of fraud or unauthorized
         purchasing
       • Reduces unnecessary inventories
       • Lowers prices because purchase volumes became
         apparent
       • Improves patient safety

Copyright 2012 John Wiley & Sons, Inc.
                                                                   3-11
Data management is a structured approach for
   capturing, storing, processing, integrating, distributing, securi
   ng, and archiving data effectively throughout their life cycle.




                                         Figure 3.2 Data life cycle


Copyright 2012 John Wiley & Sons, Inc.
                                                                      3-12
Data problems




Copyright 2012 John Wiley & Sons, Inc.
                                         3-13
Data principles

    Principle of diminishing data value. The more
     resent the information, the more valuable it is
    Principle of 90/90 data use: 90% of data is
     seldom accessed after 90 days.
    Principle of data in context. Investment in DM
     infrastructure may be huge.



Copyright 2012 John Wiley & Sons, Inc.
                                                 3-14
IT at Work 3.4

    Check page 69




Copyright 2012 John Wiley & Sons, Inc.
                                         3-15
Transforming data into knowledge

    Text mining and analytics:
       • Exploration
       • Preprocessing
       • Categorizing and modeling




Copyright 2012 John Wiley & Sons, Inc.
                                         3-16
Data from various sources are extracted, transformed, & loaded (ETL) into a data
warehouse; then used to support functions and apps throughout the enterprise.




                  Figure 3.4. Model of an Enterprise Data Warehouse
  Copyright 2012 John Wiley & Sons, Inc.
                                                                            3-17
3.2 File Management Systems
          Computer systems organize data into a hierarchy:
               bits, bytes, fields, records, files, and databases




                     Figure 3.6 Hierarchy of data for a computer-based file.

Copyright 2012 John Wiley & Sons, Inc.
                                                                               3-18
Limitations of the File Environment
    When organizations began using computers, they started with
     one application at a time, usually accounting, billing, and payroll.
     Each app was designed to be a stand-alone system, which led to
     data problems.
    Data problems with a file environment:
      • data redundancy
      • data inconsistency
      • data isolation
      • data security



Copyright 2012 John Wiley & Sons, Inc.
                                                                   3-19
• Stand-alone systems result in data
              redundancy, inconsistency, and isolation.
              •Database management systems helped solve the
              data problems of file-based systems.
Copyright 2012 John Wiley & Sons, Inc.                        3-20
Figure 3.10 Database management system provides access to all data in
    the database.


Copyright 2012 John Wiley & Sons, Inc.                                  3-21
3.3 Database Management Systems (DMBS)

    Numerous data sources
      • clickstream data from Web and e-commerce applications
      • detailed data from POS terminals
      • filtered data from CRM, supply chain, and enterprise
        resource planning applications
    DBMS permits an organization to centralize data, manage
     them efficiently, and give application programs access to the
     stored data.




Copyright 2012 John Wiley & Sons, Inc.
                                                                 3-22
2 types of databases:
a) Centralized database
b) Distributed database with
   complete or partial copies
   of the central database in
   more than one location




  Copyright 2012 John Wiley & Sons, Inc.
                                           3-23
Functions of a Database Management System (DBMS)

    Data filtering and profiling: Inspecting the data for
     errors, inconsistencies, redundancies, and incomplete
     information.
     Data quality: Correcting, standardizing, and verifying the
     integrity of the data.
    Data synchronization: Integrating, matching, or linking data
     from disparate sources.
    Data enrichment: Enhancing data using information from
     internal and external data sources.
    Data maintenance: Checking and controlling data integrity
     over time.
Copyright 2012 John Wiley & Sons, Inc.
                                                                3-24
3.4 Data Warehouses, Data Marts, and
    Data Centers
    Data warehouse: a repository in which data are organized so that
     they can be readily analyzed using methods such as data
     mining, decision support, querying, and other applications.
       • enable managers and knowledge workers to leverage enterprise data to
         make the smartest decisions
       • enable OLAP (online analytic processing)

    Data marts: designed for a strategic business unit (SBU) or a single
     department.

    Data centers: facilities containing mission-critical ISs
     and components that deliver data and IT services to the enterprise.

Copyright 2012 John Wiley & Sons, Inc.
                                                                            3-25
Figure 3.11 Data warehouse framework and views.

Copyright 2012 John Wiley & Sons, Inc.
                                                                 3-26
Characteristics of a data warehouse

    Organization. Data are organized by subject (e.g., by
     customer, vendor, product, price level, and region), and contain
     information relevant for decision support only.
    Consistency. Data in different operational databases may be encoded
     differently. For example, gender data may be encoded 0 and 1 in one
     operational system and “m” and “f” in another. In the warehouse they will
     be coded in a consistent manner.
    Time variant. The data are kept for many years so they can be used for
     trends, forecasting, and comparisons over time.
    Nonvolatile. Once entered into the warehouse, data are not updated.
    Relational. Typically the data warehouse uses a relational structure.
    Client/server. The data warehouse uses the client/server architecture
     mainly to provide the end user an easy access to its data.
    Web-based. Today’s data warehouses are designed to provide an efficient
     computing environment for Web-based applications (Rundensteiner et.
     al., 2000).

Copyright 2012 John Wiley & Sons, Inc.
                                                                           3-27
Copyright 2012 John Wiley & Sons, Inc.
                                         3-28
Building an Enterprise Data Warehouse (EDW)

     A company that is considering building a DW first needs to
     address a series of basic questions to avoid a failure:
      • Does top management support the DW?
      • Do users want access to a broad range of data
      • Do users want data access and analysis tools?
      • Do users understand how to use the DW to solve business
        problems?
      • Does the unit have one or more power users who can
        understand DW technologies?



Copyright 2012 John Wiley & Sons, Inc.
                                                             3-29
Figure 3.12 Teradata Corp.’s EDW
Copyright 2012 John Wiley & Sons, Inc.
                                                                   3-30
Suitability

     Data warehousing is most appropriate for organizations
     that have some of the following characteristics:
    End users need to access large amounts of data
    Operational data are stored in different systems
    The organization serves a large, diverse customer base
    The same data are represented differently in different systems
    Extensive end-user computing is performed


Copyright 2012 John Wiley & Sons, Inc.
                                                                3-31
3.5 Enterprise Content Management

ECM includes:
 electronic document management
 Web content management
 digital asset management, and
 electronic records management (ERM)




Copyright 2012 John Wiley & Sons, Inc.
                                         3-32
Figure 3.13 Electronic records management from creation
             to retention or destruction
Copyright 2012 John Wiley & Sons, Inc.
                                                                       3-33
Unstructured business records
 Businesses generate volumes of documents, messages, and
  memos that, by their nature, contain unstructured content
  that cannot be put into a database.
 Many of these materials are business records that must be
  retained and made available when requested by
  auditors, investigators, the SEC, the IRS, or other authorities.
 To be retrievable, business records must be organized and
  indexed.
 Records are not needed for current operations or
  decisions, are archived—moved into longer-term storage.


Copyright 2012 John Wiley & Sons, Inc.
                                                                 3-34
Business Value of E-Records Management
    Companies need to be prepared to respond to an
     audit, federal investigation, lawsuit, or other legal action
     against it.
       • Examples of lawsuits: patent violations, fraud, product safety
         negligence, theft of intellectual property, breach of contract, wrongful
         termination, harassment, and discrimination

    E-discovery is the process of gathering electronically stored
     information in preparation for trial, legal or regulatory
     investigation, or administrative action as required by law.
       • When a company receives an e-discovery request, the company must
         produce what is requested—or face charges of obstructing justice or
         being in contempt of court.
Copyright 2012 John Wiley & Sons, Inc.
                                                                              3-35
Companies have incurred huge costs for not
responding to e-discovery

    Failure to save e-mails resulted in a $2.75 million fine for
     Phillip Morris.
    Failure to respond to e-discovery requests cost Bank of
     America $10 million in fines.
    Failure to produce backup tapes and deleted e-mails resulted
     in a $29.3 million jury verdict against UBS Warburg in the
     landmark case, Zubulake v. UBS Warburg.




Copyright 2012 John Wiley & Sons, Inc.
                                                                    3-36
Copyright 2012 John Wiley & Sons, Inc.
                                         3-37
Copyright 2012 John Wiley & Sons, Inc.
                                         3-38
Exercise

    Visit Analysis Factory at analysisfactory.com
     Click view the interactive business solution
     dashboards.
    Select one type of dashboard and explain its
     value or features.




Copyright 2012 John Wiley & Sons, Inc.
                                                     3-39
Chapter 3 Link Library

    Advizor Solutions, data analytics and visualization
     http://advizorsolutions.com/

    Clarabridge: How Text Mining Works http://clarabridge.com/

    SAS Text Miner http://sas.com/

    Tableau data visualization software http://tableausoftware.com/data-
     visualization-software/

    EMC Corp., enterprise content management http://emc.com

    Oracle DBMS http://oracle.com/




Copyright 2012 John Wiley & Sons, Inc.
                                                                            3-40

More Related Content

What's hot

2012 security services clientprex
2012 security services clientprex2012 security services clientprex
2012 security services clientprex
Kim Aarenstrup
 
Backing up Android and iOs devices
Backing up Android and iOs devicesBacking up Android and iOs devices
Backing up Android and iOs devices
iSSAL
 
The uc journey_10_18
The uc journey_10_18The uc journey_10_18
The uc journey_10_18
arif muhamad
 
Cloud computing in context
Cloud computing in contextCloud computing in context
Cloud computing in context
Freeform Dynamics
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
Jennifer Polack
 
BYOD SCOPE: A Study of Corporate Policies in Pakistan
BYOD SCOPE: A Study of Corporate Policies in PakistanBYOD SCOPE: A Study of Corporate Policies in Pakistan
BYOD SCOPE: A Study of Corporate Policies in Pakistan
Shuja Ahmad
 
Forrester: How Organizations Are Improving Business Resiliency with Continuou...
Forrester: How Organizations Are Improving Business Resiliency with Continuou...Forrester: How Organizations Are Improving Business Resiliency with Continuou...
Forrester: How Organizations Are Improving Business Resiliency with Continuou...
EMC
 
Ecm implementation planning_workshop_hospital_sample
Ecm implementation planning_workshop_hospital_sampleEcm implementation planning_workshop_hospital_sample
Ecm implementation planning_workshop_hospital_sample
Christopher Wynder
 
Identity Management In Cloud Computing
Identity Management In Cloud ComputingIdentity Management In Cloud Computing
eCommerce session 3 MOGHIMI
eCommerce session 3 MOGHIMIeCommerce session 3 MOGHIMI
eCommerce session 3 MOGHIMI
Bahman Moghimi
 
Compliance With Data Security Policies
Compliance With Data Security PoliciesCompliance With Data Security Policies
Compliance With Data Security Policies
Hongyang Wang
 
Ssi Data Protection Solutions V0.2
Ssi Data Protection Solutions V0.2Ssi Data Protection Solutions V0.2
Ssi Data Protection Solutions V0.2
olambel
 
Thomas Inman
Thomas InmanThomas Inman
Thomas Inman
Colombia3.0
 
Business horizonsweston
Business horizonswestonBusiness horizonsweston
Business horizonsweston
Ikram KASSOU
 
Jennings it security overview 1 2
Jennings it security overview 1 2Jennings it security overview 1 2
Jennings it security overview 1 2
Donald Jennings
 
Big Data and Content Management. SkyDox and the European Court of Human Righ...
Big Data and Content Management.  SkyDox and the European Court of Human Righ...Big Data and Content Management.  SkyDox and the European Court of Human Righ...
Big Data and Content Management. SkyDox and the European Court of Human Righ...
SkyDox LTD
 
E intelligence
E intelligenceE intelligence
E intelligence
Sumit Sharma
 
Big Data Whitepaper - Streams and Big Insights Integration Patterns
Big Data Whitepaper  - Streams and Big Insights Integration PatternsBig Data Whitepaper  - Streams and Big Insights Integration Patterns
Big Data Whitepaper - Streams and Big Insights Integration Patterns
Mauricio Godoy
 
Gov civilworkshop
Gov civilworkshopGov civilworkshop
Gov civilworkshop
Christopher Wynder
 
Lastmile banking v1.3
Lastmile banking v1.3Lastmile banking v1.3

What's hot (20)

2012 security services clientprex
2012 security services clientprex2012 security services clientprex
2012 security services clientprex
 
Backing up Android and iOs devices
Backing up Android and iOs devicesBacking up Android and iOs devices
Backing up Android and iOs devices
 
The uc journey_10_18
The uc journey_10_18The uc journey_10_18
The uc journey_10_18
 
Cloud computing in context
Cloud computing in contextCloud computing in context
Cloud computing in context
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
BYOD SCOPE: A Study of Corporate Policies in Pakistan
BYOD SCOPE: A Study of Corporate Policies in PakistanBYOD SCOPE: A Study of Corporate Policies in Pakistan
BYOD SCOPE: A Study of Corporate Policies in Pakistan
 
Forrester: How Organizations Are Improving Business Resiliency with Continuou...
Forrester: How Organizations Are Improving Business Resiliency with Continuou...Forrester: How Organizations Are Improving Business Resiliency with Continuou...
Forrester: How Organizations Are Improving Business Resiliency with Continuou...
 
Ecm implementation planning_workshop_hospital_sample
Ecm implementation planning_workshop_hospital_sampleEcm implementation planning_workshop_hospital_sample
Ecm implementation planning_workshop_hospital_sample
 
Identity Management In Cloud Computing
Identity Management In Cloud ComputingIdentity Management In Cloud Computing
Identity Management In Cloud Computing
 
eCommerce session 3 MOGHIMI
eCommerce session 3 MOGHIMIeCommerce session 3 MOGHIMI
eCommerce session 3 MOGHIMI
 
Compliance With Data Security Policies
Compliance With Data Security PoliciesCompliance With Data Security Policies
Compliance With Data Security Policies
 
Ssi Data Protection Solutions V0.2
Ssi Data Protection Solutions V0.2Ssi Data Protection Solutions V0.2
Ssi Data Protection Solutions V0.2
 
Thomas Inman
Thomas InmanThomas Inman
Thomas Inman
 
Business horizonsweston
Business horizonswestonBusiness horizonsweston
Business horizonsweston
 
Jennings it security overview 1 2
Jennings it security overview 1 2Jennings it security overview 1 2
Jennings it security overview 1 2
 
Big Data and Content Management. SkyDox and the European Court of Human Righ...
Big Data and Content Management.  SkyDox and the European Court of Human Righ...Big Data and Content Management.  SkyDox and the European Court of Human Righ...
Big Data and Content Management. SkyDox and the European Court of Human Righ...
 
E intelligence
E intelligenceE intelligence
E intelligence
 
Big Data Whitepaper - Streams and Big Insights Integration Patterns
Big Data Whitepaper  - Streams and Big Insights Integration PatternsBig Data Whitepaper  - Streams and Big Insights Integration Patterns
Big Data Whitepaper - Streams and Big Insights Integration Patterns
 
Gov civilworkshop
Gov civilworkshopGov civilworkshop
Gov civilworkshop
 
Lastmile banking v1.3
Lastmile banking v1.3Lastmile banking v1.3
Lastmile banking v1.3
 

Viewers also liked

Data warehouse architecture
Data warehouse architectureData warehouse architecture
Data warehouse architecture
pcherukumalla
 
Chapter 2
Chapter 2Chapter 2
Chapter 2
saurabhshertukde
 
Information technology for management (6th edition)
Information technology for management (6th edition)Information technology for management (6th edition)
Information technology for management (6th edition)
MShuibMJ
 
Strategic Management and Information Technology Outsourcing
Strategic Management and Information Technology OutsourcingStrategic Management and Information Technology Outsourcing
Strategic Management and Information Technology Outsourcing
Farooq Omar
 
Chapter 8 operating systems and utility programs
Chapter 8   operating systems and utility programsChapter 8   operating systems and utility programs
Chapter 8 operating systems and utility programs
haider ali
 
Windows 10
Windows 10Windows 10
Windows 10
KrishnaTeja Siva
 

Viewers also liked (6)

Data warehouse architecture
Data warehouse architectureData warehouse architecture
Data warehouse architecture
 
Chapter 2
Chapter 2Chapter 2
Chapter 2
 
Information technology for management (6th edition)
Information technology for management (6th edition)Information technology for management (6th edition)
Information technology for management (6th edition)
 
Strategic Management and Information Technology Outsourcing
Strategic Management and Information Technology OutsourcingStrategic Management and Information Technology Outsourcing
Strategic Management and Information Technology Outsourcing
 
Chapter 8 operating systems and utility programs
Chapter 8   operating systems and utility programsChapter 8   operating systems and utility programs
Chapter 8 operating systems and utility programs
 
Windows 10
Windows 10Windows 10
Windows 10
 

Similar to Chapter 03 it-8ed-volonino

Chapter 3Data Management,Big Data Analytics, andRecords Ma.docx
Chapter 3Data Management,Big Data Analytics, andRecords Ma.docxChapter 3Data Management,Big Data Analytics, andRecords Ma.docx
Chapter 3Data Management,Big Data Analytics, andRecords Ma.docx
keturahhazelhurst
 
Chapter 3Data Management,Big Data Analytics, andRecords Ma.docx
Chapter 3Data Management,Big Data Analytics, andRecords Ma.docxChapter 3Data Management,Big Data Analytics, andRecords Ma.docx
Chapter 3Data Management,Big Data Analytics, andRecords Ma.docx
christinemaritza
 
IT for Management On-Demand Strategies for Performance, Growth,.docx
IT for Management On-Demand Strategies for Performance, Growth,.docxIT for Management On-Demand Strategies for Performance, Growth,.docx
IT for Management On-Demand Strategies for Performance, Growth,.docx
vrickens
 
Chapter 2Data Governance and IT Architecture Support Long-Term
Chapter 2Data Governance and IT Architecture Support Long-TermChapter 2Data Governance and IT Architecture Support Long-Term
Chapter 2Data Governance and IT Architecture Support Long-Term
EstelaJeffery653
 
Chapter 2Data Governance and IT Architecture Support Long-Term.docx
Chapter 2Data Governance and IT Architecture Support Long-Term.docxChapter 2Data Governance and IT Architecture Support Long-Term.docx
Chapter 2Data Governance and IT Architecture Support Long-Term.docx
cravennichole326
 
Ch03
Ch03Ch03
Ch03
kelasapa
 
Encrypted Data Management With Deduplication In Cloud...
Encrypted Data Management With Deduplication In Cloud...Encrypted Data Management With Deduplication In Cloud...
Encrypted Data Management With Deduplication In Cloud...
Angie Jorgensen
 
Database Systems
Database SystemsDatabase Systems
Database Systems
Usman Tariq
 
3 data mgmt
3 data mgmt3 data mgmt
3 data mgmt
Abha Damani
 
database disegn.pptx
database disegn.pptxdatabase disegn.pptx
database disegn.pptx
BARHAMMUSIC
 
Lecture1 is322 data&infomanag(introduction)(old curr)
Lecture1 is322 data&infomanag(introduction)(old curr)Lecture1 is322 data&infomanag(introduction)(old curr)
Lecture1 is322 data&infomanag(introduction)(old curr)
Taibah University, College of Computer Science & Engineering
 
Lecture1-IS322(Data&InfoMang-introduction)
Lecture1-IS322(Data&InfoMang-introduction)Lecture1-IS322(Data&InfoMang-introduction)
Lecture1-IS322(Data&InfoMang-introduction)
Taibah University, College of Computer Science & Engineering
 
Lecture1 is322 data&infomanag(introduction)(old curr)
Lecture1 is322 data&infomanag(introduction)(old curr)Lecture1 is322 data&infomanag(introduction)(old curr)
Lecture1 is322 data&infomanag(introduction)(old curr)
Taibah University, College of Computer Science & Engineering
 
Database Systems
Database SystemsDatabase Systems
Database Systems
Usman Tariq
 
CHAPTER-4_RELATIONAL-DATABASE.pptx
CHAPTER-4_RELATIONAL-DATABASE.pptxCHAPTER-4_RELATIONAL-DATABASE.pptx
CHAPTER-4_RELATIONAL-DATABASE.pptx
RiaBago
 
Data Warehouse: A Primer
Data Warehouse: A PrimerData Warehouse: A Primer
Data Warehouse: A Primer
IJRTEMJOURNAL
 
Database Management System 1
Database Management System 1Database Management System 1
Database Management System 1
Prof. Erwin Globio
 
Bca examination 2016 dbms
Bca examination 2016 dbmsBca examination 2016 dbms
Bca examination 2016 dbms
Anjaan Gajendra
 
IT6701 Information Management - Unit III
IT6701 Information Management - Unit IIIIT6701 Information Management - Unit III
IT6701 Information Management - Unit III
pkaviya
 
IBM InfoSphere Optim Solutions - Highlights
IBM InfoSphere Optim Solutions - HighlightsIBM InfoSphere Optim Solutions - Highlights
IBM InfoSphere Optim Solutions - Highlights
Adam Gartenberg
 

Similar to Chapter 03 it-8ed-volonino (20)

Chapter 3Data Management,Big Data Analytics, andRecords Ma.docx
Chapter 3Data Management,Big Data Analytics, andRecords Ma.docxChapter 3Data Management,Big Data Analytics, andRecords Ma.docx
Chapter 3Data Management,Big Data Analytics, andRecords Ma.docx
 
Chapter 3Data Management,Big Data Analytics, andRecords Ma.docx
Chapter 3Data Management,Big Data Analytics, andRecords Ma.docxChapter 3Data Management,Big Data Analytics, andRecords Ma.docx
Chapter 3Data Management,Big Data Analytics, andRecords Ma.docx
 
IT for Management On-Demand Strategies for Performance, Growth,.docx
IT for Management On-Demand Strategies for Performance, Growth,.docxIT for Management On-Demand Strategies for Performance, Growth,.docx
IT for Management On-Demand Strategies for Performance, Growth,.docx
 
Chapter 2Data Governance and IT Architecture Support Long-Term
Chapter 2Data Governance and IT Architecture Support Long-TermChapter 2Data Governance and IT Architecture Support Long-Term
Chapter 2Data Governance and IT Architecture Support Long-Term
 
Chapter 2Data Governance and IT Architecture Support Long-Term.docx
Chapter 2Data Governance and IT Architecture Support Long-Term.docxChapter 2Data Governance and IT Architecture Support Long-Term.docx
Chapter 2Data Governance and IT Architecture Support Long-Term.docx
 
Ch03
Ch03Ch03
Ch03
 
Encrypted Data Management With Deduplication In Cloud...
Encrypted Data Management With Deduplication In Cloud...Encrypted Data Management With Deduplication In Cloud...
Encrypted Data Management With Deduplication In Cloud...
 
Database Systems
Database SystemsDatabase Systems
Database Systems
 
3 data mgmt
3 data mgmt3 data mgmt
3 data mgmt
 
database disegn.pptx
database disegn.pptxdatabase disegn.pptx
database disegn.pptx
 
Lecture1 is322 data&infomanag(introduction)(old curr)
Lecture1 is322 data&infomanag(introduction)(old curr)Lecture1 is322 data&infomanag(introduction)(old curr)
Lecture1 is322 data&infomanag(introduction)(old curr)
 
Lecture1-IS322(Data&InfoMang-introduction)
Lecture1-IS322(Data&InfoMang-introduction)Lecture1-IS322(Data&InfoMang-introduction)
Lecture1-IS322(Data&InfoMang-introduction)
 
Lecture1 is322 data&infomanag(introduction)(old curr)
Lecture1 is322 data&infomanag(introduction)(old curr)Lecture1 is322 data&infomanag(introduction)(old curr)
Lecture1 is322 data&infomanag(introduction)(old curr)
 
Database Systems
Database SystemsDatabase Systems
Database Systems
 
CHAPTER-4_RELATIONAL-DATABASE.pptx
CHAPTER-4_RELATIONAL-DATABASE.pptxCHAPTER-4_RELATIONAL-DATABASE.pptx
CHAPTER-4_RELATIONAL-DATABASE.pptx
 
Data Warehouse: A Primer
Data Warehouse: A PrimerData Warehouse: A Primer
Data Warehouse: A Primer
 
Database Management System 1
Database Management System 1Database Management System 1
Database Management System 1
 
Bca examination 2016 dbms
Bca examination 2016 dbmsBca examination 2016 dbms
Bca examination 2016 dbms
 
IT6701 Information Management - Unit III
IT6701 Information Management - Unit IIIIT6701 Information Management - Unit III
IT6701 Information Management - Unit III
 
IBM InfoSphere Optim Solutions - Highlights
IBM InfoSphere Optim Solutions - HighlightsIBM InfoSphere Optim Solutions - Highlights
IBM InfoSphere Optim Solutions - Highlights
 

Recently uploaded

TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
SitimaJohn
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Project Management Semester Long Project - Acuity
Project Management Semester Long Project - AcuityProject Management Semester Long Project - Acuity
Project Management Semester Long Project - Acuity
jpupo2018
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Alpen-Adria-Universität
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
kumardaparthi1024
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
Chart Kalyan
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
IndexBug
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
Wouter Lemaire
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
Jason Packer
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
akankshawande
 

Recently uploaded (20)

TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Project Management Semester Long Project - Acuity
Project Management Semester Long Project - AcuityProject Management Semester Long Project - Acuity
Project Management Semester Long Project - Acuity
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
 

Chapter 03 it-8ed-volonino

  • 1. Part II. Data and Network Infrastructure C hapter 3 Data, Text, and Document Management M a n a g e m e n t I n fo r m a t i o n S y s te m s EIMBA Copyright 2012 John Wiley & Sons, Inc. 3-1
  • 2. Chapter 3 Outline 3.1 Data, Text, and Document Management 3.2 File Management Systems 3.3 Database Management Systems 3.4 Data Warehouses, Data Marts, and Data Centers 3.5 Enterprise Content Management Copyright 2012 John Wiley & Sons, Inc. 3-2
  • 3. Chapter 3 Learning Objectives  Describe data, text, and document management, and their impacts on performance.  Understand file management systems.  Understand the functions of databases and database management systems.  Describe the tactical and strategic benefits of data warehouses, data marts, and data centers. Copyright 2012 John Wiley & Sons, Inc. 3-3
  • 4. For Class Discussion & Debate Wendy's International Relies on Text Mining for Customer Experience Management Scenario for Brainstorming & Discussion (see book for full text) 1. Select an industry, company, or public sector. 2. Identify costs due to ignorance about customers’ or constituents’ experiences. 3. Explain how your selection could benefit from text analytics that provided feedback within 24 hours. 4. Compare and assess your answers with others in class. Copyright 2012 John Wiley & Sons, Inc. 3-4
  • 5. Debate (see book for full text) • Select one side of the argument, as described in the textbook. • Debate whether investments in text message collection and mining should be made even if no ROI can be determined in advance. • Provide convincing arguments either in favor of or against the investment in text message collection and mining. Copyright 2012 John Wiley & Sons, Inc. 3-5
  • 6. 3.1 Data, Text, and Document Management Data, text, and documents are strategic assets. Vast quantities are: • created and collected • then stored – often in 5 or more locations Data, text, and document management helps companies improve productivity by insuring that people can find what they need without having to conduct a long and difficult search. Copyright 2012 John Wiley & Sons, Inc. 3-6
  • 7. Data Management Why does data management matter? • No enterprise can be effective without high quality data that is accessible when needed. • Data that’s incomplete or out of context cannot be trusted. • Organizations with at least 1,000 knowledge workers lose ~ $5.7 million annually in time wasted by employees reformatting data as they move among applications. What is the goal of data management? • To provide the infrastructure and tools to transform raw data into usable information of the highest quality. Copyright 2012 John Wiley & Sons, Inc. 3-7
  • 8. Data Management Why is data management difficult and expensive? • Volume of data is increasing exponentially. • Data is scattered throughout the organization. • Data is created and used offline without going through quality control checks. • Data may be redundant and out-of-date, creating a huge maintenance problem. Copyright 2012 John Wiley & Sons, Inc. 3-8
  • 9. Data Management Current key issues  Master data management (MDM): Processes to integrate data from various sources and enterprise apps in order to create a unified view of the data.  Document management system (DMS): Hardware and software to manage, archive, and purge files and other electronic documents (e-documents).  Green computing: Efforts to conserve natural resources and reduce effects of computer usage on the environment. Copyright 2012 John Wiley & Sons, Inc. 3-9
  • 10. IT at Work 3.1 – Healthcare Sector Data Errors Cost Billions of Dollars and Put Lives at Risk  Every day, healthcare administrators and others throughout the healthcare supply chain waste 24% --30% of their time correcting data errors.  Each incorrect transaction costs $60 to $80 to correct.  About 60% of all invoices among supply chain partners have errors, and each invoice error costs $40 to $400 to reconcile.  Each year, billions of dollars are wasted in the healthcare supply chain because of supply chain data disconnects. Copyright 2012 John Wiley & Sons, Inc. 3-10
  • 11. IT at Work 3.1 (continued) Data Errors Cost Billions of Dollars and Put Lives at Risk Benefits from data synchronization in the healthcare sector and supply chair: • Easier and faster product sourcing because of accurate and consistent item information • Significantly reduces the amount of fraud or unauthorized purchasing • Reduces unnecessary inventories • Lowers prices because purchase volumes became apparent • Improves patient safety Copyright 2012 John Wiley & Sons, Inc. 3-11
  • 12. Data management is a structured approach for capturing, storing, processing, integrating, distributing, securi ng, and archiving data effectively throughout their life cycle. Figure 3.2 Data life cycle Copyright 2012 John Wiley & Sons, Inc. 3-12
  • 13. Data problems Copyright 2012 John Wiley & Sons, Inc. 3-13
  • 14. Data principles  Principle of diminishing data value. The more resent the information, the more valuable it is  Principle of 90/90 data use: 90% of data is seldom accessed after 90 days.  Principle of data in context. Investment in DM infrastructure may be huge. Copyright 2012 John Wiley & Sons, Inc. 3-14
  • 15. IT at Work 3.4  Check page 69 Copyright 2012 John Wiley & Sons, Inc. 3-15
  • 16. Transforming data into knowledge  Text mining and analytics: • Exploration • Preprocessing • Categorizing and modeling Copyright 2012 John Wiley & Sons, Inc. 3-16
  • 17. Data from various sources are extracted, transformed, & loaded (ETL) into a data warehouse; then used to support functions and apps throughout the enterprise. Figure 3.4. Model of an Enterprise Data Warehouse Copyright 2012 John Wiley & Sons, Inc. 3-17
  • 18. 3.2 File Management Systems Computer systems organize data into a hierarchy: bits, bytes, fields, records, files, and databases Figure 3.6 Hierarchy of data for a computer-based file. Copyright 2012 John Wiley & Sons, Inc. 3-18
  • 19. Limitations of the File Environment  When organizations began using computers, they started with one application at a time, usually accounting, billing, and payroll. Each app was designed to be a stand-alone system, which led to data problems.  Data problems with a file environment: • data redundancy • data inconsistency • data isolation • data security Copyright 2012 John Wiley & Sons, Inc. 3-19
  • 20. • Stand-alone systems result in data redundancy, inconsistency, and isolation. •Database management systems helped solve the data problems of file-based systems. Copyright 2012 John Wiley & Sons, Inc. 3-20
  • 21. Figure 3.10 Database management system provides access to all data in the database. Copyright 2012 John Wiley & Sons, Inc. 3-21
  • 22. 3.3 Database Management Systems (DMBS)  Numerous data sources • clickstream data from Web and e-commerce applications • detailed data from POS terminals • filtered data from CRM, supply chain, and enterprise resource planning applications  DBMS permits an organization to centralize data, manage them efficiently, and give application programs access to the stored data. Copyright 2012 John Wiley & Sons, Inc. 3-22
  • 23. 2 types of databases: a) Centralized database b) Distributed database with complete or partial copies of the central database in more than one location Copyright 2012 John Wiley & Sons, Inc. 3-23
  • 24. Functions of a Database Management System (DBMS)  Data filtering and profiling: Inspecting the data for errors, inconsistencies, redundancies, and incomplete information.  Data quality: Correcting, standardizing, and verifying the integrity of the data.  Data synchronization: Integrating, matching, or linking data from disparate sources.  Data enrichment: Enhancing data using information from internal and external data sources.  Data maintenance: Checking and controlling data integrity over time. Copyright 2012 John Wiley & Sons, Inc. 3-24
  • 25. 3.4 Data Warehouses, Data Marts, and Data Centers  Data warehouse: a repository in which data are organized so that they can be readily analyzed using methods such as data mining, decision support, querying, and other applications. • enable managers and knowledge workers to leverage enterprise data to make the smartest decisions • enable OLAP (online analytic processing)  Data marts: designed for a strategic business unit (SBU) or a single department.  Data centers: facilities containing mission-critical ISs and components that deliver data and IT services to the enterprise. Copyright 2012 John Wiley & Sons, Inc. 3-25
  • 26. Figure 3.11 Data warehouse framework and views. Copyright 2012 John Wiley & Sons, Inc. 3-26
  • 27. Characteristics of a data warehouse  Organization. Data are organized by subject (e.g., by customer, vendor, product, price level, and region), and contain information relevant for decision support only.  Consistency. Data in different operational databases may be encoded differently. For example, gender data may be encoded 0 and 1 in one operational system and “m” and “f” in another. In the warehouse they will be coded in a consistent manner.  Time variant. The data are kept for many years so they can be used for trends, forecasting, and comparisons over time.  Nonvolatile. Once entered into the warehouse, data are not updated.  Relational. Typically the data warehouse uses a relational structure.  Client/server. The data warehouse uses the client/server architecture mainly to provide the end user an easy access to its data.  Web-based. Today’s data warehouses are designed to provide an efficient computing environment for Web-based applications (Rundensteiner et. al., 2000). Copyright 2012 John Wiley & Sons, Inc. 3-27
  • 28. Copyright 2012 John Wiley & Sons, Inc. 3-28
  • 29. Building an Enterprise Data Warehouse (EDW) A company that is considering building a DW first needs to address a series of basic questions to avoid a failure: • Does top management support the DW? • Do users want access to a broad range of data • Do users want data access and analysis tools? • Do users understand how to use the DW to solve business problems? • Does the unit have one or more power users who can understand DW technologies? Copyright 2012 John Wiley & Sons, Inc. 3-29
  • 30. Figure 3.12 Teradata Corp.’s EDW Copyright 2012 John Wiley & Sons, Inc. 3-30
  • 31. Suitability Data warehousing is most appropriate for organizations that have some of the following characteristics:  End users need to access large amounts of data  Operational data are stored in different systems  The organization serves a large, diverse customer base  The same data are represented differently in different systems  Extensive end-user computing is performed Copyright 2012 John Wiley & Sons, Inc. 3-31
  • 32. 3.5 Enterprise Content Management ECM includes:  electronic document management  Web content management  digital asset management, and  electronic records management (ERM) Copyright 2012 John Wiley & Sons, Inc. 3-32
  • 33. Figure 3.13 Electronic records management from creation to retention or destruction Copyright 2012 John Wiley & Sons, Inc. 3-33
  • 34. Unstructured business records  Businesses generate volumes of documents, messages, and memos that, by their nature, contain unstructured content that cannot be put into a database.  Many of these materials are business records that must be retained and made available when requested by auditors, investigators, the SEC, the IRS, or other authorities.  To be retrievable, business records must be organized and indexed.  Records are not needed for current operations or decisions, are archived—moved into longer-term storage. Copyright 2012 John Wiley & Sons, Inc. 3-34
  • 35. Business Value of E-Records Management  Companies need to be prepared to respond to an audit, federal investigation, lawsuit, or other legal action against it. • Examples of lawsuits: patent violations, fraud, product safety negligence, theft of intellectual property, breach of contract, wrongful termination, harassment, and discrimination  E-discovery is the process of gathering electronically stored information in preparation for trial, legal or regulatory investigation, or administrative action as required by law. • When a company receives an e-discovery request, the company must produce what is requested—or face charges of obstructing justice or being in contempt of court. Copyright 2012 John Wiley & Sons, Inc. 3-35
  • 36. Companies have incurred huge costs for not responding to e-discovery  Failure to save e-mails resulted in a $2.75 million fine for Phillip Morris.  Failure to respond to e-discovery requests cost Bank of America $10 million in fines.  Failure to produce backup tapes and deleted e-mails resulted in a $29.3 million jury verdict against UBS Warburg in the landmark case, Zubulake v. UBS Warburg. Copyright 2012 John Wiley & Sons, Inc. 3-36
  • 37. Copyright 2012 John Wiley & Sons, Inc. 3-37
  • 38. Copyright 2012 John Wiley & Sons, Inc. 3-38
  • 39. Exercise  Visit Analysis Factory at analysisfactory.com Click view the interactive business solution dashboards.  Select one type of dashboard and explain its value or features. Copyright 2012 John Wiley & Sons, Inc. 3-39
  • 40. Chapter 3 Link Library  Advizor Solutions, data analytics and visualization http://advizorsolutions.com/  Clarabridge: How Text Mining Works http://clarabridge.com/  SAS Text Miner http://sas.com/  Tableau data visualization software http://tableausoftware.com/data- visualization-software/  EMC Corp., enterprise content management http://emc.com  Oracle DBMS http://oracle.com/ Copyright 2012 John Wiley & Sons, Inc. 3-40