Survey
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Chapter 9 Business Intelligence Systems “We Can Make the Bits Produce Any Report You Want, But You’ve Got to Pay for It.” • Need to monitor patient workout data. • Spending too many hours each day looking at patient workout data. • Great use for exception reporting. • Animation & new types of reporting creates innovative and motivating reports. • Eliminating silos enables everyone to gain more information from PRIDE data. Copyright © 2015 Pearson Education, Inc. 9-2 Study Questions Q1: How do organizations use business intelligence (BI) systems? Q2: What are the three primary activities in the BI process? Q3: How do organizations use data warehouses and data marts to acquire data? Q4: How do organizations use reporting applications? Q5: How do organizations use data mining applications? Q6: How do organizations use BigData applications? Q7: What is the role of knowledge management systems? Q8: What are the alternatives for publishing BI? Q9: 2024? Copyright © 2015 Pearson Education, Inc. 9-3 Q1: How Do Organizations Use Business Intelligence (BI) Systems? Components of Business Intelligence System Copyright © 2015 Pearson Education, Inc. 9-4 Example Uses of Business Intelligence Copyright © 2015 Pearson Education, Inc. 9-5 What Are Typical Uses for BI? • Identifying changes in purchasing patterns – Important life events cause customers to change what they buy. • BI for entertainment – Netflix has data on watching, listening, and rental habits, however, determines what people actually want, not what they say. • Predictive policing – Analyze data on past crimes, including location, date, time, day of week, type of crime, and related data, to predict where crimes are likely to occur. Copyright © 2015 Pearson Education, Inc. 9-6 Q2: What Are the Three Primary Activities in the BI Process? Copyright © 2015 Pearson Education, Inc. 9-7 Using Business Intelligence to Find Candidate Parts at AllRoad • Identified criteria for parts customers might want to print themselves. – Provided by vendors who already agree to make part design files available for sale. – Purchased by larger customers. – Frequently ordered parts. – Ordered in small quantities. – Simple in design. Copyright © 2015 Pearson Education, Inc. 9-8 Acquire Data: Extracted Order Data Copyright © 2015 Pearson Education, Inc. 9-9 Extracted Part Data Copyright © 2015 Pearson Education, Inc. 9-10 Analyze Data: Access Query Copyright © 2015 Pearson Education, Inc. 9-11 Query Result Copyright © 2015 Pearson Education, Inc. 9-12 Joining Order Extract and Filtered Parts Tables Copyright © 2015 Pearson Education, Inc. 9-13 Sample Orders and Parts View Data Copyright © 2015 Pearson Education, Inc. 9-14 Customer Summary Copyright © 2015 Pearson Education, Inc. 9-15 Qualifying Parts Query Design Copyright © 2015 Pearson Education, Inc. 9-16 Qualifying Parts Query Results Figure Copyright © 2015 Pearson Education, Inc. 9-17 Publish Results: Sales History for Selected Parts Copyright © 2015 Pearson Education, Inc. 9-18 Q3: How Do Organizations Use Data Warehouses and Data Marts to Acquire Data? Functions of a Data Warehouse • Extract data from operational, internal and external databases. • Cleanse data. • Organize, relate data warehouse. • Catalog data using metadata. Copyright © 2015 Pearson Education, Inc. 9-19 Components of a Data Warehouse Copyright © 2015 Pearson Education, Inc. 9-20 Examples of Consumer Data That Can Be Purchased Copyright © 2015 Pearson Education, Inc. 9-21 Possible Problems with Source Data Curse of dimensionality Copyright © 2015 Pearson Education, Inc. 9-22 Data Warehouses Versus Data Marts Copyright © 2015 Pearson Education, Inc. 9-23 Q4: How Do Organizations Use Reporting Applications? • Create meaningful information from disparate data sources. • Deliver information to user on time. • Basic operations: 1. Sorting 2. Filtering 3. Grouping 4. Calculating 5. Formatting Copyright © 2015 Pearson Education, Inc. 9-24 How Does RFM Analysis Classify Customers? • Recently • Frequently • Money Copyright © 2015 Pearson Education, Inc. 9-25 RFM Analysis Classifies Customers Copyright © 2015 Pearson Education, Inc. 9-26 Typical OLAP Report OLAP Product Family by Store Type Copyright © 2015 Pearson Education, Inc. 9-27 Example of Expanded Grocery Sales OLAP Report Drill down into the data Copyright © 2015 Pearson Education, Inc. 9-28 OLAP Product Family and Store Location by Store Type, Showing Sales Data for Four Cities Copyright © 2015 Pearson Education, Inc. 9-29 Q5: How Do Organizations Use Data Mining Applications? Copyright © 2015 Pearson Education, Inc. 9-30 Unsupervised Data Mining • Analyst does not start with a priori hypothesis or model. • Hypothesized model created based on analytical results to explain patterns found. • Example: Cluster analysis. Copyright © 2015 Pearson Education, Inc. 9-31 Supervised Data Mining • Uses a priori model to compute outcome of model • Prediction, such as regression analysis • Ex: CellPhoneWeekendMinutes = (12 + (17.5*CustomerAge)+(23.7*NumberMonthsOfAccount) = 12 + 17.5*21 + 23.7*6 = 521.7 Copyright © 2015 Pearson Education, Inc. 9-32 Market-Basket Analysis • Market-basket analysis – a data-mining technique for determining sales patterns. – Statistical methods to identify sales patterns in large volumes of data. – Products customers tend to buy together. – Probabilities of customer purchases. – Identify cross-selling opportunities. Customers who bought fins also bought a mask. Copyright © 2015 Pearson Education, Inc. 9-33 Market-Basket Example: Dive Shop Transactions = 400 Copyright © 2015 Pearson Education, Inc. 9-34 Decision Trees • Hierarchical arrangement of criteria to predict a classification or value. • Unsupervised data mining technique. • Basic idea of a decision tree – Select attributes most useful for classifying something on some criteria to create “pure groups”. Copyright © 2015 Pearson Education, Inc. 9-35 Credit Score Decision Tree Copyright © 2015 Pearson Education, Inc. 9-36 Decision Rules for Accepting or Rejecting Offer to Purchase Loans If percent past due is less than 50 percent, then accept loan. • If percent past due is greater than 50 percent and • If CreditScore is greater than 572.6 and • If CurrentLTV is less than .94, then accept loan. • Otherwise, reject loan. Copyright © 2015 Pearson Education, Inc. 9-37 Using MIS InClass Exercise 9: What Singularity Have We Wrought? Trends in the Computing Industry Copyright © 2015 Pearson Education, Inc. 9-38 Q6: How Do Organizations Use BigData Applications? • Huge volume – petabyte and larger. • Rapid velocity – generated rapidly. • Great variety – Structured data, free-form text, log files, possibly graphics, audio, and video. Copyright © 2015 Pearson Education, Inc. 9-39 MapReduce Processing Summary Google search log broken into pieces Copyright © 2015 Pearson Education, Inc. 9-40 Google Trends on the Term Web 2.0 Copyright © 2015 Pearson Education, Inc. 9-41 Hadoop • Open-source program supported by Apache Foundation2. • Manages thousands of computers. • Implements MapReduce – Written in Java • Amazon.com supports Hadoop as part of EC3 cloud offering. • Query language entitled Pig. Copyright © 2015 Pearson Education, Inc. 9-42 Q7: What Is the Role of Knowledge Management Systems? • Knowledge Management – Creating value from intellectual capital and sharing that knowledge with those who need that capital. – Preserving organizational memory by capturing and storing lessons learned and best practices of key employees. Copyright © 2015 Pearson Education, Inc. 9-43 Benefits of Knowledge Management • Improve process quality. • Increase team strength. • Goal: – Enable employees to use organization’s collective knowledge. Copyright © 2015 Pearson Education, Inc. 9-44 What Are Expert Systems? Expert systems Rule-based IF/THEN Encode human knowledge Expert systems shells Process IF side of rules Report values of all variables Knowledge gathered from human experts Copyright © 2015 Pearson Education, Inc. 9-45 Example of IF/THEN Rules Copyright © 2015 Pearson Education, Inc. 9-46 Drawbacks of Expert Systems 1. Difficult and expensive to develop – Labor intensive – Ties up domain experts 2. Difficult to maintain – Changes cause unpredictable outcomes – Constantly need expensive changes 3. Don’t live up to expectations – Can’t duplicate diagnostic abilities of humans Copyright © 2015 Pearson Education, Inc. 9-47 What Are Content Management Systems (CMS)? • Support management and delivery of documents, other expressions of employee knowledge • Challenges of Content Management – Databases are huge – Content dynamic – Documents do not exist in isolation – Contents are perishable – In many languages Copyright © 2015 Pearson Education, Inc. 9-48 What are CMS Application Alternatives? • In-house custom – Customer support department develops in-house database applications to track customer problems • Off-the-shelf – Horizontal market products (SharePoint) – Vertical market applications • Public search engine – Google Copyright © 2015 Pearson Education, Inc. 9-49 How Do Hyper-Social Organizations Manage Knowledge? • Hyper-social knowledge management – Application of social media and related applications for management and delivery of organizational knowledge resources. • Hyper-organization theory – Framework for understanding this new direction in KM. – Focus moves from knowledge and content per se to fostering authentic relationships among creators and users of knowledge. Copyright © 2015 Pearson Education, Inc. 9-50 Hyper-Social KM Alternative Media Copyright © 2015 Pearson Education, Inc. 9-51 Q8: What Are the Alternatives for Publishing BI? Copyright © 2015 Pearson Education, Inc. 9-52 Elements of a BI System Copyright © 2015 Pearson Education, Inc. 9-53 Q9: 2024? • World generating and storing exponentially more information. • Information about customers, and data mining techniques going to get better. • Companies will know more about your purchasing habits and psyche. • Social singularity – Machines will build their own information systems. • Will machines possess and create information for themselves? Copyright © 2015 Pearson Education, Inc. 9-54 Guide: Semantic Security 1. Unauthorized access to protected data and information – Physical security Passwords and permissions Delivery system must be secure 2. Unintended release of protected information through reports and documents. 3. What, if anything, can be done to prevent what Megan did? Copyright © 2015 Pearson Education, Inc. 9-55 Guide: Data Mining in the Real World • Problems: – Dirty data – Missing values – Lack of knowledge at start of project – Over fitting – Probabilistic – Seasonality – High risk – unknown outcome Copyright © 2015 Pearson Education, Inc. 9-56 Active Review Q1: How do organizations use business intelligence (BI) systems? Q2: What are the three primary activities in the BI process? Q3: How do organizations use data warehouses and data marts to acquire data? Q4: How do organizations use reporting applications? Q5: How do organizations use data mining applications? Q6: How do organizations use BigData applications? Q7: What is the role of knowledge management systems? Q8: What are the alternatives for publishing BI? Q9: 2024? Copyright © 2015 Pearson Education, Inc. 9-57 Case Study 9: Hadoop the Cookie Cutter • Third-party cookie created by a site other than one you visited. • Generated in several ways, most common occurs when a Web page includes content from multiple sources. • DoubleClick – IP address where content was delivered. – Records data in cookie log. Copyright © 2015 Pearson Education, Inc. 9-58 Case Study 9: Hadoop the Cookie Cutter (cont'd) • Third-party cookie owner has history of what was shown, what ads clicked, and intervals between interactions. • Cookie log contains data to show how you respond to ads and your pattern of visiting various Web sites where ads placed. Copyright © 2015 Pearson Education, Inc. 9-59 FireFox Collusion Copyright © 2015 Pearson Education, Inc. 9-60 Ghostery in Use (ghostery.com) Copyright © 2015 Pearson Education, Inc. 9-61 9-62