Академический Документы
Профессиональный Документы
Культура Документы
Management - IS433
Semester 1, 2015
Lecture 3
2
1.
2.
3.
4.
5.
6.
7.
IT-Performance Model
4
The Problem:
Over the past decades, business have invested heavily in IT
infrastructures (eg. ISs) to capture, store, analyze and
communicate data.
Creation of ISs to manage and process data and the
deployment of communication networks does not generate
value, as measured by an increase in profit (profit =
revenues expenses)
Company realized that Profit increases when employees
learn from data and use data to increase revenues, reduce
expenses or both.
In the learn and earn model., from their data, they can
predict what actions will lead to the greatest increase in net
earnings.
Business uncertainty
6
Problem
8
IT Solution
9
Results
10
Results: Improved
profitability.
IS433 Information Management
13
Data Management
14
Data Management
15
high-quality data,
Quality of data depends on effective approaches to data
management.
Too often, managers and information workers are
constrained by data that cant be trusted because they are
incomplete, out of context, outdated, inaccurate,
inaccessible require weeks to analyze
In those situations, decision maker is facing too much
uncertainty to make intelligent Business decisions.
Data Storage
Internal
Data
Data Marts
Data Analytics
OLAP,
Queries,
EIS, DSS
Data
Warehouse
External
Data
Results
Data
Visualization
SCM
CRM
Decision
Support
Data Marts
E-Commerse
Data
Mining
Knowledge and
its Management
Personal
expertise &
Judgement
Business
Applications
Strategy
Others
3.
Data Visualization
21
22
32
Document Management
34
3-36
Phillip Morris.
Failure to respond to e-discovery requests cost Bank of
Records, File
Bit, Byte
Figure 3.6
Hierarchy of data for a computer-based file.
Limitations
42
Limitations
43
Figure 3.8
Database Types
46
Figure 3.9 (a) Centralized database. (b) Distributed database with complete or
partial copies of the central database in more than one location.
IS433 Information Management
Centralized Databases
47
consistent
Files are not accessible except via the centralized
host computer, where they can be protected more
easily from unauthorized access or modification.
Vulnerable to a single point of failure.
Computer fails, all users are affected.
When users are widely dispersed and must
perform data manipulations from distances, they
often experience transmission delays.
Distributed Databases
48
Distributed Databases
49
DBMS
51
Copyright 2010 John Wiley & Sons, Inc. IS433 Information Management
Data Management
3-54
Data Management
355
Data Management
3-57
Current key issues
Master data management (MDM): Processes to integrate
Data Warehouses
59
Data Warehouses
60
Building a Data
Warehouse
68
11
Suitability
69
Data marts
70
implement
As an alternative, many firms create a lower-cost,
scaled down version of a data warehouse called a
data mart.
Data marts are designed for a strategic business
unit, or a single department
Allow for local rather than central control.
Contain less information than Data WH
Respond more quickly and easier to understand
71
Data Center
72
4 key forces
74
Discovery or
the request for information
75
lawsuits
The average $1 billion company in US faces 147 lawsuits
Each lawsuit will involve discovery or the request for
information (almost always involves the request for email
and other electronic communications).
Discovery
76
Managerial Issues
77
Managerial Issues
78
Managerial Issues
79
Create a database front end that can act as a translator from the old
system to the new.
Integrate the older applications into the new system so that data can
be seamlessly accessed in the original format.
Managerial Issues
80
Quiz
81
Link Library
382
http://advizorsolutions.com/
Clarabridge: How Text Mining Works http://clarabridge.com/
SAS Text Miner http://sas.com/
visualization-software/
EMC Corp., enterprise content management http://emc.com
Oracle DBMS http://oracle.com/