Skip to main content

What is Business Intelligence ?



Typical use of BI :
In Identifying changes in purchasing patterns
      Important life events change what customers buy.
In Entertainment
      Netflix has data on watching, listening, and rental habits.
      Classify customers by viewing patterns.
In Predictive policing
     Analyze data on past crimes - location, date, time, day of week, type of crime, and related data.



Ethic Guide : Unseen Cyberazzi
Data broker or Data aggregator
      Acquires and purchases consumer and other data from public records, retailers, Internet cookie vendors, social media trackers, and other sources.
      Data for business intelligence to sell to companies and governments.
Cheap cloud processing of consumer data easier, less expensive.
Processing happens in secret.
Data brokers enable you to view data stored about you, but ...
      Difficult to learn how to request your data,
      Torturous process to file for it,
      Limited data usefulness.

Functions of a data warehouse
      Obtain data from operational, internal and external databases.
      Cleanse data.
      Organize and relate data.
     

Catalog data using metadata.


Reporting Application
The purpose of reporting application is to create meaningful information from disparate data sources and deliver information to user on time.
Basic operations:
  1. Sorting  
  2. Filtering
  3. Grouping          
  4. Calculating      
  5. Formatting

RFM Analysis :
-Recently
-Frequently
-Money

Unsupervised data mining
       No a priori hypothesis or model.
       Findings obtained solely by data analysis.
       Hypothesized model created to explain patterns found.
Supervised data mining
       Uses a priori model.
       Prediction, such as regression analysis.
Market-Basket Analysis
      Identify sales patterns in large volumes of data.
      Identify what  products customers tend to buy together.
      Computes probabilities of purchases.
      Identify cross-selling opportunities.
Decision Tress
       Unsupervised data mining technique.
       Hierarchical arrangement of criteria to predict a value or classification.
       Select attributes most useful for classifying “pure groups.”


BI for security trading
       Quantitative applications using BigData and BI.
      Analyze immense amounts of data over a broad spectrum of sources.
      Build and evaluate investment strategies.
Knowledge Management (KM)
Creating value from intellectual capital and sharing knowledge with those who need that capital.
       Preserving organizational memory
Capturing and storing lessons learned and best practices of key employees.
       Scope of KM same as SM in hyper-social organizations.
Benefit of Knowledge Management
1.      Improve process quality.
2.      Increase team strength.
3.      Enable users to use organization’s collective knowledge.



Drawback of Expert System
  1. Difficult and expensive to develop.
      Labor intensive.
      Ties up domain experts.
  1. Difficult to maintain.
      Changes cause unpredictable outcomes.
      Constantly need expensive changes.
  1. Don’t live up to expectations.
      Can’t duplicate diagnostic abilities of humans.
Content Management Systems (CMS)
            Manage and delivery of documents, and other employees/users knowledge.
Challenge of CMS :
- Huge Databases.
- Dynamic Content.
Alternative of CMS
       In-house custom development
      Customer support develops in-house database applications to track customer problems.
       Off-the-shelf
      Horizontal market products (SharePoint).
      Vertical market applications.
       Public search engine
      Google, Bing.
Hyper-social knowledge management
      Social media, and related applications, for management and delivery of organizational knowledge resources.
Hyper-organization theory
      Framework for understanding KM.
      Focus shifts from knowledge and content to fostering authentic relationships among knowledge creators and users.



Guide:
            Semantic Security
    1. Unauthorized access to protected data and information.
    2. Physical security
Ø  Passwords and permissions.
Ø  Delivery system must be secure.
    1. Unintended release of protected information through reports and documents.
Data Mining In Real World
Problems:
      Dirty data
      Missing values
      Lack of knowledge at start of project
      Over fitting
      Probabilistic
      Seasonality
      High risk with unpredictable outcome




Comments

Popular posts from this blog

About Me

My name is Kevin Octavianus Halim. I am BINUSIAN 2020 I lived in Penjaringan, North Jakarta. Currently, I am studying in Binus University, in faculty Information System and right now, I am in semester 3. I make this blog is to let everyone know what i am doing in Binus University, to aknowledge people to increase their insight about Binus University, and also if someone need to learn more about Binus University. With this, I attached my binusmaya profile, #if anyone doesn't know about binusmaya, binusmaya is a website for BINUSIAN that contains about lecturers, staffs , and students. This is my first time to make a blog, and I don't have any experience about journalism so i hope you guys (aka. Reader) can help me by give me a support or suggestion to makes me a better person. Thank you.

Movie Review : Uchiage Hanabi, Shita kara Miru ka? Yoko kara Miru ka? (Fireworks, Should We See It from the Side or the Bottom?)

My first opinion when i watch the trailer on the youtube is like "Woah, maybe this one is same like any other movies" meaning my opinion thinks that the movie is mainstream and has a normal/usual storyline like other movies. But when i watching this movie, i was interested on the story. The movie hook me up so well, where the fantasy become real. And unpredictable storyline. The graphic of this movie, i can give point 8/10, the drawing good, but some scene there is lack of drawing and they let the scene become "manga" drawing where the background is changed into white & black. The story of this movie, i give it 7/10. The story is unique, but more often its kinda sad for me since they didnt finished all story in 1 movie, meaning they make me hanging for the story, maybe i will read the manga for this movie (Since the movie is adaptation from manga) and maybe the manga will completely finished the story. I totally recommend this movie for you gu...

Testing and System Implementation Assignment #2

This is my 2nd assignment for Testing and System Implementation course, the first assignment was do on class and I have no documentation about it. This assignment come from my lecturer Daniel Kartawiguna with NIDN D2431. I am terribly sorry if i mentioned my lecturer name without his Bachelor or in Indonesia "Gelar" because i dont have a note to write his full name. === /// === Assignment# 02 [Individual] 1.      Please explain the Software Quality Characteristics and Sub Characteristics(ISO 9126) according to ISO9126! 2.Please explain the advantage and disadvantage of each service organization models according slides no.  42, 43, 44, and 45! 3.    What are the advantages and disadvantages of “Skills-based Test Organization” and “Project-based Test Organization ”? === /// === The answer will be posted soon. Thank you for reading :D. Please leave a note for Suggestion or Critics