Information Systems and Knowledge
Management, Information, data and Intelligence, The Characteristics of Valuable Information, Relevance, Quality, Timeliness, Completeness, Knowledge Management, Global Information Systems, Decision Support Systems, Databases and Data Warehousing, Input Management, Computerized Data Archives Networks and Electronic Data Interchange, The Internet and Research
Integrating user needs into ECM projects is key to success. Whether it is a initial implementation or a reboot or just expanding use, user needs and UX testing should be integrated into every project
As mobile devices & remote working practices become more prevalent in today's organizations, an increasing number of workers are using consumer file sharing tools to ensure they have access to the latest version of documents.
However enterprise requirements are very different to individual preferences when establishing which tools to use.
Whether a project lasts two weeks or spans months, no matter if the team consists of three
members or dozens, an electronic document management system can help entities keep track
of the documents, reports, and correspondences involved from the planning to execution phases.
EDM software can help ensure that no project member misses out on key information.
Learn more at the http://na.sage.com/sage-construction-and-real-estate
AMCTO presentation on moving from records managment to information managementChristopher Wynder
This presentation was given to AMCTO zones 1 and 4/5. It presents how to use the records classification as the core for a faceted classification schema that can be used to enable workflow and processes across the organization.
Integrating user needs into ECM projects is key to success. Whether it is a initial implementation or a reboot or just expanding use, user needs and UX testing should be integrated into every project
As mobile devices & remote working practices become more prevalent in today's organizations, an increasing number of workers are using consumer file sharing tools to ensure they have access to the latest version of documents.
However enterprise requirements are very different to individual preferences when establishing which tools to use.
Whether a project lasts two weeks or spans months, no matter if the team consists of three
members or dozens, an electronic document management system can help entities keep track
of the documents, reports, and correspondences involved from the planning to execution phases.
EDM software can help ensure that no project member misses out on key information.
Learn more at the http://na.sage.com/sage-construction-and-real-estate
AMCTO presentation on moving from records managment to information managementChristopher Wynder
This presentation was given to AMCTO zones 1 and 4/5. It presents how to use the records classification as the core for a faceted classification schema that can be used to enable workflow and processes across the organization.
Presentation on using workflow to implement a highly used ECM system.
Provides a step-by-step outline how to understand user needs through marketing techniques such as user journeys and persona building.
Introduces the concept that ECM is an organically growing system rather than an architected software solution.
ISSC340_Presentation_Ronald_Averion.pptxNAME Ronald Averi.docxchristiandean12115
ISSC340_Presentation_Ronald_Averion.pptx
NAME: Ronald Averion
TITLE: SHARED iDRIVE
INTRODUCTION
Efficiency in data storage and data retrieval is a key factor in the productivity of an organization.
iDRIVE enables data to be securely stored, retrieved and shared in an efficient manner.
Background information
Shared drive enhances sharing of data in a networked environment.
Users are divided into user groups so that privileges can be effected and managed easily
For security purposes, users can access specific data depending on their user group.
Conventional storage mechanisms don’t offer this flexibility.
This is an Information Technology Supported, which has been authorized and one that is managed to give space for storage space electronically for the users that has been authorized for some given network. In some cases the drive is given the name as the J: Drive (Phillips & Skagerberg, 2003). The use of the share drive is necessary because it enables information to be store in one place and the users from same department can share it increasing efficiency in an organisation.
2
OBJECTIVES
To carry out research on how old methods of sharing data was done.
To investigate the drawbacks of the old methods of storing data.
To carry out research on how shared drive is implemented.
To show the advantages of using shared drive technology in an organization.
To carry out research on how old method of sharing files was done.
To investigate the drawbacks of the old method of storing files.
To carry out research on how shared drive is implemented.
To recommend use of shared drive in an organization.
3
REQUIREMENTS
The shared drive should conform to Professional and Ethical standards.
Enough funds to facilitate the whole project.
Hardware requirements(computers, servers , internetworking tools)
Software requirements(Windows server2012 R2)
Contribute to society and human well-being.
Does your application infringe on any fundamental human rights?
Avoid harm to others.
Be honest and trustworthy.
4
ADVANTAGES OF IDRIVE
It enables various users in an organization to share information and data
Facilitates easier retrieval of data. This enhances performance and productivity.
Enhances data security by implementing user groups and privileges
Eliminates unnecessary duplication of data(Besanko, 2010). This makes it easier when it comes to sorting out of the files and hence makes it easier to retrieve it.
It enables the various members of a given staff who are working in some work areas to have knowledge of the exact place from which they have the ability of accessing enjoy form of information that they want.
It enables folders to be kept in a hierarchy that can be controlled hence enabling the electronic folders and the tittles of the documents which have been stored hence easing the situation in which some given form of information is required to be retrieved from the system.
The third advantage is that the electronic information which rel.
Presentation on using workflow to implement a highly used ECM system.
Provides a step-by-step outline how to understand user needs through marketing techniques such as user journeys and persona building.
Introduces the concept that ECM is an organically growing system rather than an architected software solution.
ISSC340_Presentation_Ronald_Averion.pptxNAME Ronald Averi.docxchristiandean12115
ISSC340_Presentation_Ronald_Averion.pptx
NAME: Ronald Averion
TITLE: SHARED iDRIVE
INTRODUCTION
Efficiency in data storage and data retrieval is a key factor in the productivity of an organization.
iDRIVE enables data to be securely stored, retrieved and shared in an efficient manner.
Background information
Shared drive enhances sharing of data in a networked environment.
Users are divided into user groups so that privileges can be effected and managed easily
For security purposes, users can access specific data depending on their user group.
Conventional storage mechanisms don’t offer this flexibility.
This is an Information Technology Supported, which has been authorized and one that is managed to give space for storage space electronically for the users that has been authorized for some given network. In some cases the drive is given the name as the J: Drive (Phillips & Skagerberg, 2003). The use of the share drive is necessary because it enables information to be store in one place and the users from same department can share it increasing efficiency in an organisation.
2
OBJECTIVES
To carry out research on how old methods of sharing data was done.
To investigate the drawbacks of the old methods of storing data.
To carry out research on how shared drive is implemented.
To show the advantages of using shared drive technology in an organization.
To carry out research on how old method of sharing files was done.
To investigate the drawbacks of the old method of storing files.
To carry out research on how shared drive is implemented.
To recommend use of shared drive in an organization.
3
REQUIREMENTS
The shared drive should conform to Professional and Ethical standards.
Enough funds to facilitate the whole project.
Hardware requirements(computers, servers , internetworking tools)
Software requirements(Windows server2012 R2)
Contribute to society and human well-being.
Does your application infringe on any fundamental human rights?
Avoid harm to others.
Be honest and trustworthy.
4
ADVANTAGES OF IDRIVE
It enables various users in an organization to share information and data
Facilitates easier retrieval of data. This enhances performance and productivity.
Enhances data security by implementing user groups and privileges
Eliminates unnecessary duplication of data(Besanko, 2010). This makes it easier when it comes to sorting out of the files and hence makes it easier to retrieve it.
It enables the various members of a given staff who are working in some work areas to have knowledge of the exact place from which they have the ability of accessing enjoy form of information that they want.
It enables folders to be kept in a hierarchy that can be controlled hence enabling the electronic folders and the tittles of the documents which have been stored hence easing the situation in which some given form of information is required to be retrieved from the system.
The third advantage is that the electronic information which rel.
Data Center – An All-In-One Application Ecosystem with Big Data Managing Cert...Keith Jones
Data centers are network-integrated all-in-one application centric remote server ecosystem that stores, manages, and processes huge amount of valuable organization data primarily coming from varied digital media sources.
● Why Databases?
● Why Database Design is Important?
● The Database System Environment and Functions.
● Managing the Database System: A Shift in Focus.
Week 4 Lecture 1 - Databases and Data WarehousesManagement of .docxjessiehampson
Week 4 Lecture 1 - Databases and Data Warehouses
Management of Information Systems
Databases and Data Warehouses
The impact of database technology on how business is conducted today cannot be overemphasized. This technology has enabled an information industry with comprehensive influences on businesses and individuals. Databases store data that populate web pages and other interactive networked technologies. Search engines, e-commerce, and social media would not exist without databases. With database support, larger tasks can be accomplished by fewer people.
Effective data management is the principal benefit of IT. Database management systems (DBMSs) enable the fast creation of databases and manipulation of data on an aggregate basis or down to the smallest detail for business purposes. Databases support most web pages and other interactive networked technology. DBMSs support target marketing, financial management, decision-making, distribution of goods and services, customer service, and other activities. It is imperative, in the age of data mining, and “big data,” for knowledge workers to understand how databases work and how data are used operationally and strategically in business management.
Database analysis and management skills are mandatory in the marketplace. IT professionals develop and implement databases. However, data is essential to the non-technical professional who uses the data for decision making regarding accounting, marketing, logistics, senior management, and other functional areas.
The relational database model is common. However, data can be organized in other ways. “Big Data” prompted the use of other database models. “NoSQL” database models are non-relational and do not require SQL to retrieve data. NoSQL databases can be structured by object, document, key-value, graph, column, and other possibilities
In relational databases, a primary key is a field in a table that contains a unique value used to differentiate between rows of data. The primary key is usually a number, or a computer generated globally unique identifier (GUID). Sometimes a composite key is used differentiate between table rows. A composite key is a combination of the values in two or more fields in a table that when combined are unique in the table and serve as a primary key. A foreign key is used to link data between two tables. A foreign key in a table is the primary key of a related table.
Databases contain different types of fields. Some types are, number, text, image, video, audio, geographical coordinates, and others. If a number is not used for mathematical calculations, it is best to assign a text type to it in a database to avoid the need to convert it from a number to a string after retrieval.
SQL is a popular query language used to retrieve data from relational databases. SQL can be used to retrieve data from more than one table by use of a “join.” A join query retrieves data from rows in two or more tables, where the value of the foreign ...
BIG DATA IN CLOUD COMPUTING REVIEW AND OPPORTUNITIESijcsit
Big Data is used in decision making process to gain useful insights hidden in the data for business and engineering. At the same time it presents challenges in processing, cloud computing has helped in advancement of big data by providing computational, networking and storage capacity. This paper presents the review, opportunities and challenges of transforming big data using cloud computing resources.
Big Data is used in decision making process to gain useful insights hidden in the data for business and engineering. At the same time it presents challenges in processing, cloud computing has helped in advancement of big data by providing computational, networking and storage capacity. This paper presents the review, opportunities and challenges of transforming big data using cloud computing resources.
DATA VISUALIZATION FOR MANAGERS MODULE 1| Creating Visual Analysis with Interactive Data Visualization software Desktop| BUSINESS ANALYTICS PAPER 1 |MBA SEM 3| RTMNU NAGPUR UNIVERSITY| BY JAYANTI R PANDE
MBA Notes by Jayanti Pande
#JayantiPande
#MBA
#MBAnotes
#BusinessAnalyticsNotes
The software development process is complete for computer project analysis, and it is important to the evaluation of the random project. These practice guidelines are for those who manage big-data and big-data analytics projects or are responsible for the use of data analytics solutions. They are also intended for business leaders and program leaders that are responsible for developing agency capability in the area of big data and big data analytics .
For those agencies currently not using big data or big data analytics, this document may assist strategic planners, business teams and data analysts to consider the value of big data to the current and future programs.
This document is also of relevance to those in industry, research and academia who can work as partners with government on big data analytics projects.
Technical APS personnel who manage big data and/or do big data analytics are invited to join the Data Analytics Centre of Excellence Community of Practice to share information of technical aspects of big data and big data analytics, including achieving best practice with modeling and related requirements. To join the community, send an email to the Data Analytics Centre of Excellence
Information and communication system
Analyse of a computer-based information system used in the work environment detailing inputs to the system, methods of processing, and information produced in the form of report.
Yasmina Rayeh
Binary addition, Binary subtraction, Negative number representation, Subtraction using 1’s complement and 2’s complement, Binary multiplication and division, Arithmetic in octal, hexadecimal number system, BCD and Excess – 3 arithmetic
INTERNET PROTOCOL (IP)
, Datagram Format
, Fragmentation
, Options
, Security of IPv4 Datagrams
,ICMPv4
, MESSAGES
, Debugging Tools
, ICMP Checksum
, MOBILE IP
, Addressing
, Agents
, Three Phases
, Inefficiency in Mobile IP
Numbering system, binary number system, octal number system, decimal number system, hexadecimal number system.
Code conversion, Conversion from one number system to another, floating point numbers
Introduction to the Data Link Layer, Types of errors, redundancy and coding. Block coding, Error detection, error correction. Linear block codes. Cyclic codes(CRC), Checksum method.
Theory building, What Is a Theory? , What Are the Goals of Theory?, Research Concepts, Constructs, Propositions, Variables, and Hypotheses, Research Concepts and Constructs, Research Propositions and Hypotheses, Understanding Theory, Verifying Theory, Theory Building, The Scientific Method
The Role of Business Research, The Nature of Business Research, Business Research Defined, Applied and Basic Business Research , The Scientific method, Managerial Value of business Research, Identifying Problems or Opportunities, Diagnosing and Assessing Problems or Opportunities, Selecting and Implementing a Course of Action, Evaluating the Course of Action, When Is Business Research Needed?, Time Constraints, Availability of Data, Nature of the Decision, Benefits versus Costs, Business Research in the Twenty-First Century, Communication Technologies, Global Business Research
Analog Transmission, data communication
Digital-to-analog conversion, analog-to-analog conversion, Digital to Digital conversion, Analog to Digital Conversion, Amplitude Shift Keying , Frequency Shift Keying, Phase Shift Keying,Quadrature Amplitude Modulation, Amplitude Modulation (AM), Frequency Modulation (FM), Phase Modulation (PM)
Adjusting primitives for graph : SHORT REPORT / NOTESSubhajit Sahu
Graph algorithms, like PageRank Compressed Sparse Row (CSR) is an adjacency-list based graph representation that is
Multiply with different modes (map)
1. Performance of sequential execution based vs OpenMP based vector multiply.
2. Comparing various launch configs for CUDA based vector multiply.
Sum with different storage types (reduce)
1. Performance of vector element sum using float vs bfloat16 as the storage type.
Sum with different modes (reduce)
1. Performance of sequential execution based vs OpenMP based vector element sum.
2. Performance of memcpy vs in-place based CUDA based vector element sum.
3. Comparing various launch configs for CUDA based vector element sum (memcpy).
4. Comparing various launch configs for CUDA based vector element sum (in-place).
Sum with in-place strategies of CUDA mode (reduce)
1. Comparing various launch configs for CUDA based vector element sum (in-place).
Techniques to optimize the pagerank algorithm usually fall in two categories. One is to try reducing the work per iteration, and the other is to try reducing the number of iterations. These goals are often at odds with one another. Skipping computation on vertices which have already converged has the potential to save iteration time. Skipping in-identical vertices, with the same in-links, helps reduce duplicate computations and thus could help reduce iteration time. Road networks often have chains which can be short-circuited before pagerank computation to improve performance. Final ranks of chain nodes can be easily calculated. This could reduce both the iteration time, and the number of iterations. If a graph has no dangling nodes, pagerank of each strongly connected component can be computed in topological order. This could help reduce the iteration time, no. of iterations, and also enable multi-iteration concurrency in pagerank computation. The combination of all of the above methods is the STICD algorithm. [sticd] For dynamic graphs, unchanged components whose ranks are unaffected can be skipped altogether.
As Europe's leading economic powerhouse and the fourth-largest hashtag#economy globally, Germany stands at the forefront of innovation and industrial might. Renowned for its precision engineering and high-tech sectors, Germany's economic structure is heavily supported by a robust service industry, accounting for approximately 68% of its GDP. This economic clout and strategic geopolitical stance position Germany as a focal point in the global cyber threat landscape.
In the face of escalating global tensions, particularly those emanating from geopolitical disputes with nations like hashtag#Russia and hashtag#China, hashtag#Germany has witnessed a significant uptick in targeted cyber operations. Our analysis indicates a marked increase in hashtag#cyberattack sophistication aimed at critical infrastructure and key industrial sectors. These attacks range from ransomware campaigns to hashtag#AdvancedPersistentThreats (hashtag#APTs), threatening national security and business integrity.
🔑 Key findings include:
🔍 Increased frequency and complexity of cyber threats.
🔍 Escalation of state-sponsored and criminally motivated cyber operations.
🔍 Active dark web exchanges of malicious tools and tactics.
Our comprehensive report delves into these challenges, using a blend of open-source and proprietary data collection techniques. By monitoring activity on critical networks and analyzing attack patterns, our team provides a detailed overview of the threats facing German entities.
This report aims to equip stakeholders across public and private sectors with the knowledge to enhance their defensive strategies, reduce exposure to cyber risks, and reinforce Germany's resilience against cyber threats.
StarCompliance is a leading firm specializing in the recovery of stolen cryptocurrency. Our comprehensive services are designed to assist individuals and organizations in navigating the complex process of fraud reporting, investigation, and fund recovery. We combine cutting-edge technology with expert legal support to provide a robust solution for victims of crypto theft.
Our Services Include:
Reporting to Tracking Authorities:
We immediately notify all relevant centralized exchanges (CEX), decentralized exchanges (DEX), and wallet providers about the stolen cryptocurrency. This ensures that the stolen assets are flagged as scam transactions, making it impossible for the thief to use them.
Assistance with Filing Police Reports:
We guide you through the process of filing a valid police report. Our support team provides detailed instructions on which police department to contact and helps you complete the necessary paperwork within the critical 72-hour window.
Launching the Refund Process:
Our team of experienced lawyers can initiate lawsuits on your behalf and represent you in various jurisdictions around the world. They work diligently to recover your stolen funds and ensure that justice is served.
At StarCompliance, we understand the urgency and stress involved in dealing with cryptocurrency theft. Our dedicated team works quickly and efficiently to provide you with the support and expertise needed to recover your assets. Trust us to be your partner in navigating the complexities of the crypto world and safeguarding your investments.
Show drafts
volume_up
Empowering the Data Analytics Ecosystem: A Laser Focus on Value
The data analytics ecosystem thrives when every component functions at its peak, unlocking the true potential of data. Here's a laser focus on key areas for an empowered ecosystem:
1. Democratize Access, Not Data:
Granular Access Controls: Provide users with self-service tools tailored to their specific needs, preventing data overload and misuse.
Data Catalogs: Implement robust data catalogs for easy discovery and understanding of available data sources.
2. Foster Collaboration with Clear Roles:
Data Mesh Architecture: Break down data silos by creating a distributed data ownership model with clear ownership and responsibilities.
Collaborative Workspaces: Utilize interactive platforms where data scientists, analysts, and domain experts can work seamlessly together.
3. Leverage Advanced Analytics Strategically:
AI-powered Automation: Automate repetitive tasks like data cleaning and feature engineering, freeing up data talent for higher-level analysis.
Right-Tool Selection: Strategically choose the most effective advanced analytics techniques (e.g., AI, ML) based on specific business problems.
4. Prioritize Data Quality with Automation:
Automated Data Validation: Implement automated data quality checks to identify and rectify errors at the source, minimizing downstream issues.
Data Lineage Tracking: Track the flow of data throughout the ecosystem, ensuring transparency and facilitating root cause analysis for errors.
5. Cultivate a Data-Driven Mindset:
Metrics-Driven Performance Management: Align KPIs and performance metrics with data-driven insights to ensure actionable decision making.
Data Storytelling Workshops: Equip stakeholders with the skills to translate complex data findings into compelling narratives that drive action.
Benefits of a Precise Ecosystem:
Sharpened Focus: Precise access and clear roles ensure everyone works with the most relevant data, maximizing efficiency.
Actionable Insights: Strategic analytics and automated quality checks lead to more reliable and actionable data insights.
Continuous Improvement: Data-driven performance management fosters a culture of learning and continuous improvement.
Sustainable Growth: Empowered by data, organizations can make informed decisions to drive sustainable growth and innovation.
By focusing on these precise actions, organizations can create an empowered data analytics ecosystem that delivers real value by driving data-driven decisions and maximizing the return on their data investment.
Explore our comprehensive data analysis project presentation on predicting product ad campaign performance. Learn how data-driven insights can optimize your marketing strategies and enhance campaign effectiveness. Perfect for professionals and students looking to understand the power of data analysis in advertising. for more details visit: https://bostoninstituteofanalytics.org/data-science-and-artificial-intelligence/
Opendatabay - Open Data Marketplace.pptxOpendatabay
Opendatabay.com unlocks the power of data for everyone. Open Data Marketplace fosters a collaborative hub for data enthusiasts to explore, share, and contribute to a vast collection of datasets.
First ever open hub for data enthusiasts to collaborate and innovate. A platform to explore, share, and contribute to a vast collection of datasets. Through robust quality control and innovative technologies like blockchain verification, opendatabay ensures the authenticity and reliability of datasets, empowering users to make data-driven decisions with confidence. Leverage cutting-edge AI technologies to enhance the data exploration, analysis, and discovery experience.
From intelligent search and recommendations to automated data productisation and quotation, Opendatabay AI-driven features streamline the data workflow. Finding the data you need shouldn't be a complex. Opendatabay simplifies the data acquisition process with an intuitive interface and robust search tools. Effortlessly explore, discover, and access the data you need, allowing you to focus on extracting valuable insights. Opendatabay breaks new ground with a dedicated, AI-generated, synthetic datasets.
Leverage these privacy-preserving datasets for training and testing AI models without compromising sensitive information. Opendatabay prioritizes transparency by providing detailed metadata, provenance information, and usage guidelines for each dataset, ensuring users have a comprehensive understanding of the data they're working with. By leveraging a powerful combination of distributed ledger technology and rigorous third-party audits Opendatabay ensures the authenticity and reliability of every dataset. Security is at the core of Opendatabay. Marketplace implements stringent security measures, including encryption, access controls, and regular vulnerability assessments, to safeguard your data and protect your privacy.
2. CONTENT
2.1 Information, data and Intelligence
2.2 The Characteristics of Valuable Information
2.2.1 Relevance
2.2.2 Quality
2.2.3 Timeliness
2.2.4 Completeness
2.3 Knowledge Management
2.4 Global Information Systems
2.5 Decision Support Systems
2.5.1 Databases and Data Warehousing
2.5.2 Input Management
2.5.3 Computerized Data Archives
2.5.4 Networks and Electronic Data Interchange
2.6 The Internet and Research
3. 2.1 INFORMATION, DATA AND INTELLIGENCE
Data are simply facts or recorded measures of certain phenomena (things or
events).
Information is data formatted (structured) to support decision making or
define the relationship between two facts.
Business intelligence is the subset of data and information that actually
has some explanatory power enabling effective managerial decisions to
be made.
So, there is more data than information, and more information than
intelligence.
Ex. Home Depot
5. 2.2 CHARACTERISTICS OF VALUABLE
INFORMATION
Not all data are valuable to decision makers. Useful
data become information and help a business manager
make decisions.
Useful data can also become intelligence.
Four characteristics help determine how useful data
may be:
Relevance
Quality
Timeliness
Completeness
6. 2.2.1 RELEVANCE
Relevant data have the characteristic of pertinence to the situation at hand.
The information is useful.
Relevance is the characteristics of data reflecting how pertinent these
particular facts are to the situation at hand.
7. 2.2.2 QUALITY
Data quality is the degree to which data represent the true situation.
High-quality data are accurate, valid, and reliable,
High-quality data represent reality faithfully and present a good picture of
reality.
8. 2.2.3 TIMELINESS
Timeliness means that the data are current enough to still be relevant.
Timely information is obtained at the right time.
Computerized information systems can record events and present
information as a transaction takes place, improving timeliness.
9. 2.2.4 COMPLETENESS
Information completeness refers to having the right amount of
information.
Managers must have sufficient information about all aspects of their
decisions.
10. 2.3 KNOWLEDGE MANAGEMENT
Knowledge is a blend of previous experience, insight, and data that
forms organizational memory.
Knowledge management is the process of creating an inclusive,
comprehensive, easily accessible organizational memory, which can
be called the organization’s intellectual capital
11. 2.4 GLOBAL INFORMATION SYSTEMS
A Global Information System is an organized collection of computer
hardware, software, data, and personnel designed to capture, store, update,
manipulate, analyze, and immediately display information about worldwide
business activities.
A global information system is a tool for providing past, present, and
projected information on internal operations and external activity.
Using satellite communications, high-speed microcomputers, electronic data
interchanges, fiber optics, data storage devices, and other technological
advances in interactive media, global information systems are changing the
nature of business.
12. 2.5 DECISION SUPPORT SYSTEM
Decision Support System : A computer-based system that helps decision makers
confront problems through direct interaction with databases and analytical software
programs.
The purpose of a decision support system is to store data and transform them into
organized information that is easily accessible to marketing managers.
Modern decision support systems greatly facilitate customer relationship
management (CRM).
A CRM system is the part of the DSS that addresses exchanges between the firm and
its customers.
It brings together information about customers including sales data, market trends,
marketing promotions and the way consumers respond to them, customer preferences,
and more.
A CRM system describes customer relationships in sufficient detail so that financial
directors, marketing managers, salespeople, customer service representatives, and
perhaps the customers themselves can access information directly, match customer
needs with satisfying product offerings, remind customers of service requirements, and
know what other products a customer has purchased.
13. 2.5 DECISION SUPPORT SYSTEM
Data collected in business research
projects are a major source of this
input
Useful information is the output of a
DSS.
A decision support system requires
both databases and software.
The DSS becomes part of its global
information system
14. 2.5.1 DATABASES AND DATA WAREHOUSING
A database is a collection of raw data arranged logically and organized in a
form that can be stored and processed by a computer.
Data warehousing is the process allowing important day-to-day operational
data to be stored and organized for simplified access.
A data warehouse is the multitiered computer storehouse of current and
historical data.
Data warehouse management requires that the detailed data from
operational systems be extracted, transformed, placed into logical partitions
(for example, daily data, weekly data, etc.), and stored in a consistent
manner
15. 2.5.1 INPUT MANAGEMENT
Input includes all the numerical, text, voice, and image data that enter the DSS.
Systematic accumulation of pertinent, timely, and accurate data is essential to
the success of a decision support system.
Input data can also come from external sources.
Five major sources of data input:
Internal records,
Proprietary business research
Salesperson input
Behavioral tracking
Outside vendors and External distributors of data.
16.
17. 2.5.3 COMPUTERIZED DATA ARCHIVES
STATISTICAL DATABASES
Statistical databases contain numerical data for analysis and forecasting.
demographic, sales, and other relevant business variables are recorded by
geographical area
FINANCIAL DATABASES
Competitors’ and customers’ financial data, such as income statements and
balance sheets
VIDEO DATABASES
Movie studios provide clips of upcoming films and advertising agencies put
television commercials on the Internet
18. 2.5.4 NETWORKS AND ELECTRONIC DATA
INTERCHANGE
Networking involves linking two or more computers to share data and
software.
Electronic data interchange (EDI) systems integrate one company’s
computer system directly with another company’s system.
Much of the input to a company’s decision support system may come
through networks from other companies’ computers.
19. 2.6 THE INTERNET AND RESEARCH
The widespread usage of the Internet is perhaps the single biggest change
agent in business research.
The Internet are useful in understanding business research.
20. 2.6.1 WHAT EXACTLY IS THE INTERNET?
The Internet is a worldwide network of computers that allows users access
to data, information, and feedback from distant sources.
A domain is typically a company name, institutional name, or organizational
name associated with a host computer.
A host is where the content for a particular Web site physically resides and
is accessed.
For example, Forbes magazine’s Internet edition is located at
http://forbes.com.
21. 2.6.2 HOW IS THE INTERNET USEFUL IN
RESEARCH?
The Internet is useful to researchers in many ways
ACCESSING AVAILABLE DATA
COLLECTING DATA
22. 2.6.3 NAVIGATING THE INTERNET
World Wide Web (WWW)
A portion of the Internet that is a system of computer servers that organize information into
documents called Web pages
content providers
Parties that furnish information on the World Wide Web.
uniform resource locator (URL)
A Web site address that Web browsers recognize.
search engine
A computerized directory that allows anyone to search the World Wide Web for information
using a keyword search.
keyword search
Takes place as the search engine searches through millions of Web pages for documents
containing the keywords.
23. 2.6.4 INTERACTIVE MEDIA AND
ENVIRONMENTAL SCANNING
Interactive medium
A medium, such as the Internet, that a person can use to communicate with and interact
with other users.
Environmental scanning
Entails all information gathering designed to detect changes in the external operating
environment of the firm.
24. 2.6.5 INFORMATION TECHNOLOGY
Pull technology
Consumers request information from a Web page and the browser then determines a
response; the consumer is essentially asking for the data.
Push technology
Sends data to a user’s computer without a request being made; software is used to
guess what information might be interesting to consumers based on the pattern of
previous responses.
Smart agent software
Software capable of learning an Internet user’s preferences and automatically searching
out information in selected Web sites and then distributing it.
Cookies, in computer terminology, are small computer files that record a user’s
Web usage history.
25. 2.6.6 INTRANET
Private data network
Uses internet standards and technology
Firewalls for security
26. SUMMARY
Know and distinguish between the concepts of data, information, and intelligence
Understand the four characteristics that describe data: The usefulness of data to
management can be described based on four characteristics: relevance, quality,
timeliness, and completeness.
Know the purpose of research in assisting business operations: A computer-based
decision support system helps decision makers confront problems through direct
interactions with databases and analytical models. A DSS stores data and transforms
them into organized information that is easily accessible to managers.
Know what a decision support system is and does: Business data come from four
major sources: internal records, proprietary business research, business intelligence,
and outside vendors and external distributors.
Recognize the major categories of databases.