Business Intelligence Systems

Slides:



Advertisements
Similar presentations
Distributed Data Processing
Advertisements

© Pearson Prentice Hall Using MIS 2e Chapter 9 Business Intelligence Systems David Kroenke.
Business Intelligence Systems
Business Intelligence Systems
With Microsoft Access 2010© 2011 Pearson Education, Inc. Publishing as Prentice Hall1 PowerPoint Presentation to Accompany GO! with Microsoft ® Access.
5.1 © 2007 by Prentice Hall 5 Chapter Foundations of Business Intelligence: Databases and Information Management.
DAVID M. KROENKE’S DATABASE PROCESSING, 10th Edition © 2006 Pearson Prentice Hall COS 236 Day 25.
By: Mr Hashem Alaidaros MIS 211 Lecture 4 Title: Data Base Management System.
INSERT BOOK COVER 1Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall. Exploring Microsoft Access 2010 by Robert Grauer, Keith Mast,
Chapter 5 Database Processing.
Chapter 9 Business Intelligence Systems
Chapter 9 Competitive Advantage with Information Systems for Decision Making © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke.
Chapter 3 Database Management
DAVID M. KROENKE’S DATABASE PROCESSING, 10th Edition © 2006 Pearson Prentice Hall COS 346 Day 26.
McGraw-Hill/Irwin Copyright © 2008, The McGraw-Hill Companies, Inc. All rights reserved.McGraw-Hill/Irwin Copyright © 2008 The McGraw-Hill Companies, Inc.
Chapter 4: Database Management. Databases Before the Use of Computers Data kept in books, ledgers, card files, folders, and file cabinets Long response.
Big Data, Data Warehouses, and Business Intelligence Systems
Chapter 3 Organizational Strategy, Information Systems, and Competitive Advantage.
Database Processing Chapter "No, Drew, You Don’t Know Anything About Report Writing.” Copyright © 2014 Pearson Education, Inc. Publishing as Prentice.
Data Resource Management Data Concepts Database Management Types of Databases Chapter 5 McGraw-Hill/Irwin Copyright © 2007 by The McGraw-Hill Companies,
Big Data, Data Warehouses, and Business Intelligence Systems Chapter Eight DAVID M. KROENKE and DAVID J. AUER DATABASE CONCEPTS, 7 th Edition.
Lecture-8/ T. Nouf Almujally
1.Understand the decision-making process of consumer purchasing online. 2.Describe how companies are building one-to-one relationships with customers.
Management Information Systems Competitive Advantage with Information Systems for Decision Making Chapter 9.
Business Intelligence and Information Systems for Decision Making
© Paradigm Publishing, Inc. 5-1 Chapter 5 Application Software Chapter 5 Application Software.
Computers Are Your Future Tenth Edition Chapter 12: Databases & Information Systems Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall1.
Copyright © 2003 by Prentice Hall Computers: Tools for an Information Age Chapter 13 Database Management Systems: Getting Data Together.
Copyright © 2009 Pearson Education, Inc. Slide 6-1 Chapter 6 E-commerce Marketing Concepts.
Chapter 9 Business Intelligence and Information Systems for Decision Making.
Objectives Overview Define the term, database, and explain how a database interacts with data and information Define the term, data integrity, and describe.
© 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke Slide 1 Chapter 9 Competitive Advantage with Information Systems for Decision Making.
Chapter 6: Foundations of Business Intelligence - Databases and Information Management Dr. Andrew P. Ciganek, Ph.D.
Case 2: Emerson and Sanofi Data stewards seek data conformity
Lecturer: Gareth Jones. How does a relational database organise data? What are the principles of a database management system? What are the principal.
Professor Michael J. Losacco CIS 1110 – Using Computers Database Management Chapter 9.
Chapter 11 Business Intelligence Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall 11-1.
Database A database is a collection of data organized to meet users’ needs. In this section: Database Structure Database Tools Industrial Databases Concepts.
Chapter 5 Database Processing. Neil uses software to query a database, but it has about 25 standard queries that don’t give him all he needs. He imports.
1.file. 2.database. 3.entity. 4.record. 5.attribute. When working with a database, a group of related fields comprises a(n)…
5-1 McGraw-Hill/Irwin Copyright © 2007 by The McGraw-Hill Companies, Inc. All rights reserved.
Business Intelligence Systems Appendix J DAVID M. KROENKE and DAVID J. AUER DATABASE CONCEPTS, 6 th Edition.
Technology In Action Chapter 11 1 Databases and… Databases and their uses Database components Types of databases Database management systems Relational.
5 - 1 Copyright © 2006, The McGraw-Hill Companies, Inc. All rights reserved.
4 - 1 Copyright © 2006, The McGraw-Hill Companies, Inc. All rights reserved. Computer Software Chapter 4.
6.1 © 2010 by Prentice Hall 6 Chapter Foundations of Business Intelligence: Databases and Information Management.
ITGS Databases.
Chapter 5: Business Intelligence: Data Warehousing, Data Acquisition, Data Mining, Business Analytics, and Visualization DECISION SUPPORT SYSTEMS AND BUSINESS.
1 Technology in Action Chapter 11 Behind the Scenes: Databases and Information Systems Copyright © 2010 Pearson Education, Inc. Publishing as Prentice.
Chapter Extension 15 Reporting Systems and OLAP © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke.
Building Dashboards SharePoint and Business Intelligence.
Skills for Success with Microsoft Office 2013 Volume 1 Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall. by Kris Townsend, Catherine.
DATA RESOURCE MANAGEMENT
Foundations of Business Intelligence: Databases and Information Management.
Digital Planet: Tomorrow’s Technology and You Chapter 7 Database Applications and Privacy Implications Copyright © 2012 Pearson Education, Inc. publishing.
+ Big Data. + Chapter Objectives Learn the basic concepts of Big Data, structured storage, and the MapReduce process Learn the basic concepts of data.
Collaborative Planning Training. Agenda  Collaboration Overview  Setting up Collaborative Planning  User Setups  Collaborative Planning and Forecasting.
© 2003 Prentice Hall, Inc.3-1 Chapter 3 Database Management Information Systems Today Leonard Jessup and Joseph Valacich.
Chapter 11 Information and Data Management Discovering Computers Technology in a World of Computers, Mobile Devices, and the Internet.
David M. Kroenke and David J. Auer Database Processing Fundamentals, Design, and Implementation Chapter Twelve: Big Data, Data Warehouses, and Business.
David M. Kroenke and David J. Auer Database Processing Fundamentals, Design, and Implementation Appendix J: Business Intelligence Systems.
Database Processing Chapter "No, Drew, You Don’t Know Anything About Creating Queries.” Copyright © 2015 Pearson Education, Inc. Operational database.
Copyright © 2011 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Chapter 28 Data Mining Concepts.
Foundations of Business Intelligence: Databases and Information Management Chapter 6 VIDEO CASES Case 1a: City of Dubuque Uses Cloud Computing and Sensors.
INTRODUCTION TO INFORMATION SYSTEMS LECTURE 9: DATABASE FEATURES, FUNCTIONS AND ARCHITECTURES PART (2) أ/ غدير عاشور 1.
Using MIS Chapter 9 Business Intelligence Systems 10th Edition
Business Intelligence Systems
Big DATA.
Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall
Presentation transcript:

Business Intelligence Systems Chapter 9 Business Intelligence Systems This chapter considers applications of business intelligence systems that use employee knowledge, organizational data and purchased external data.

“We Can Produce Any Report You Want, But You’ve Got to Pay for It.” Different expectations about what a report is Great use for exception reporting Feature PRIDE prototype and supporting data are stored in profile, profileworkout, and equipment tables Need legal advice on system GOALS: Use the PRIDE system to: Illustrate a practical application for business intelligence systems, specifically reporting. Show the use of animation for reporting on a mobile device. Provide a setting to teach standard reporting terminology. Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall

Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall Study Questions Q1: How do organizations use business intelligence (BI) systems? Q2: What are the three primary activities in the BI process? Q3: How do organizations use data warehouses and data marts to acquire data? Q4: What are three techniques for processing BI data? Q5: What are the alternatives for publishing BI? Chapter begins by summarizing reasons organizations use business intelligence. Then, it describes three basic activities in business intelligence process and illustrates those activities using GearUp. Next, are discussions of data warehouses, data marts, data mining and knowledge management applications, followed by alternatives for publishing BI results. Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall

Q1: How Do Organizations Use Business Intelligence (BI) Systems? Business intelligence systems are information systems that process operational and other data to identify patterns, relationships, and trends for use by business professionals and other knowledge workers. Five standard IS components of BI systems: hardware, software, data, procedures, and people. Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall

Example Uses of Business Intelligence Note the hierarchical nature of these tasks. Business intelligence is used for all four of the collaborative tasks described in Chapter 2. Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall

Q2: What Are the Three Primary Activities in the BI Process? > Publish results: The process of delivering business intelligence to the knowledge workers who need it. Push publishing delivers BI according to a schedule, or as a result of an event or particular data condition without any request from users. Pull publishing requires users to request BI results. Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall

Using BI for Problem-solving at GearUp: Process and Potential Problems Obtain commitment from vendor Run sales event Sells as many items as it can Order amount actually sold Receive partial order and damaged items If received less than ordered, ship partial order to customers Some customers cancel orders Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall

Tables Used for BI Analysis at GearUp Top section shows three of tables in GearUp’s operational database used to produce the data extract. Lucas uses these data to create Item_Shipped, Item_Not_ Shipped, and Quantity_Received tables. Addison summed quantities from tables to create Item_Summary_Data table. Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall

Extract of the Item_Summary Table To discriminate between orders lost to damage and those lost to cancellations, GearUp computes TotalCancelled, but it must do so indirectly. Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall

Lost Sales Summary Report To determine the extent of sales lost due to short shipments or damage, Addison created an Access report (Figure 9-6) to sum data from the Item_Summary_Data table The extract of ITEM_SUMMARY Table is shown in Lost_Sales_Summary. From this report, vendors 5000 and 2000 have never had a shortage or quality problem. Vendor 4000 has a modest problem, vendors 1000 and 3000 have caused numerous lost sales, either due to shortages or damaged goods. 55.5% of sales of vendor 3000’s items have been lost (19,450/35,000). Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall

Lost Sales Details Report This report shows items by EventItemNumber and not by item name, event date, and event date. A sample of an Excel spreadsheet with event data, including vendor and item names, is shown on next slide. Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall

Event Data Spreadsheet If Drew’s spreadsheet were in tabular format, it would be easy to import this data from Excel to Access. However, it is not. Someone must either put it into tabular format or extract the data from the spreadsheet and enter it manually. Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall

Short and Damaged Shipments Summary All vendor 1000 problems are caused by damage, vendor 1000 always shipped the appropriate number. Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall

Short and Damaged Shipments Details Report This report shows vendor 1000 has persistent damage problems and vendor 3000's shipments are short. Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall

Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall Publish Results Options Print and distribute via email or collaboration tool Publish on Web server or SharePoint Publish on a BI server Automate results via Web service These options are discussed in more detail in Q5. For now, just realize that GearUp would choose among these alternatives according to its needs. Most likely, they will print the results and email them or share them via a collaboration tool. Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall

Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall Q3: How Do Organizations Use Data Warehouses and Data Marts to Acquire Data? Why extract operational data for BI processing? Security and control Operational not structured for BI analysis BI analysis degrades operational server performance IS professionals do not want business analysts processing operational data because if they make an error, it could have severe consequences on operations. Also, operational data is structured for fast and reliable transaction processing, and not for BI analysis. Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall

Functions of a Data Warehouse Obtain or extract data from operational, internal and external databases Cleanse data Organize, relate, store in a data warehouse database DBMS interface between data warehouse database and BI applications Maintain metadata catalog Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall

Components of a Data Warehouse Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall

Examples of Consumer Data that Can Be Purchased Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall

Possible Problems with Source Data Most operational and purchased data have problems that inhibit their usefulness for business intelligence. Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall

Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall Data Marts Examples A data mart is a subset of a data warehouse. A date mart addresses a particular component or functional area of the business. Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall

Q4: What Are Three Techniques for Processing BI Data? Basic operations: Sorting   Filtering Grouping   Calculating Formatting Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall

Three Types of BI Analysis Goals and characteristics of three fundamental types of BI analysis. Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall

Unsupervised Data Mining Analyst does not create a priori hypotheses or model Hypotheses created after to explain patterns found Example: Cluster analysis Cluster analysis: A statistical technique to identify groups of entities that have similar characteristics; commonly used to find groups of similar customers from customer order and demographic data Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall

Supervised Data Mining Develop a priori model to compute estimated parameters of model Used for prediction, such as regression analysis Ex: CellPhoneWeekendMinutes = (12 + (17.5 X CustomerAge) + (23.7 X NumberMonthsOfAccount) =12 + 17.5*21 + 23.7*6 = 521.7 With regression equation, analysts predict number of minutes of weekend cell phone use by summing 12, plus 17.5 times the customer’s age, plus 23.7 times the number of months of the account. 17.5 and 23.7 are the regression model coefficients. Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall

Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall BigData Huge volume – petabyte and larger Rapid velocity – generated rapidly Great variety Free-form text Different formats of Web server and database log files Streams of data about user responses to page content; graphics, audio, and video files Describe data collections characterized by huge volume, rapid velocity, and great variety. Considering volume, BigData refers to data sets at least a petabyte in size, and usually larger. Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall

MapReduce Processing Summary Technique for harnessing power of thousands of computers working in parallel Basic idea is BigData collection is broken into pieces, and hundreds or thousands of independent processors search these pieces for something of interest Google search logs broken into pieces Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall

Google Trends on the Term Web 2.0 This particular trend line supports the contention that the term "Web 2.0" is fading from use. Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall

Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall Hadoop Open-source program supported by Apache Foundation2 Manages thousands of computers Implements MapReduce Written in Java Amazon.com supports Hadoop as part of EC3 cloud offering Pig – query language Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall

Experiencing MIS InClass Exercise 9: What Wonder Have We Wrought? Data aggregator is a company that obtains data from public and private sources and stores, combines, and publishes it in sophisticated ways. See Instructor’s Manual for example answers to questions. Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall

Q5: What Are the Alternatives for Publishing BI? This table lists four server alternatives for BI publishing. Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall

What Are the Two Functions of a BI Server? Components of a Generic Business Intelligence System A BI server is a Web server application created for the publishing of business intelligence. It maintains metadata about authorized allocation of BI results to users. Server tracks what results are available, what users are authorized to view those results, and provided results to authorized users. It adjusts allocations as available results change and users come and go. Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall

How Does the Knowledge in This Chapter Help You? Companies will know more about your purchasing habits and psyche. Singularity – machines build their own information systems. Will machines possess and create information for themselves? You have learned the three phases of BI analysis, as well as, common techniques for acquiring, processing, and publishing business intelligence. This knowledge will enable you to imagine innovative uses for data that your employer generates and to know some of the constraints of such use. Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall

Ethics Guide: Data Mining in the Real World Problems: • Dirty data • Missing values • Lack of knowledge at start of project • Over fitting • Probabilistic • Seasonality • High risk—cannot know outcome GOAL Teach real-world issues and limitations for data mining. Investigate the ethics of working on projects of doubtful or harmful utility to the sponsoring organization. Case has two major themes: realistic problems in data mining and an ethical dilemma—when you know something that could be self-defeating to reveal. Both are important. Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall

Guide: Semantic Security Unauthorized access to protected data and information Physical security Passwords and permissions Delivery system must be secure Unintended release of protected information through reports and documents What, if anything, can be done to prevent what Megan did? GOALS Discuss trade-off between information availability and security. Introduce, explain, and discuss ways to respond to semantic security. Megan is able to combine data in various reports to infer protected information about company employees. She was not supposed to see this information, but only used reports she was authorized to see. Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall

Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall Active Review Q1: How do organizations use business intelligence (BI) systems? Q2: What are the three primary activities in the BI process? Q3: How do organizations use data warehouses and data marts to acquire data? Q4: What are three techniques for processing BI Data? Q5: What are the alternatives for publishing BI? Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall

Case Study 9: Hadoop the Cookie Cutter Third-party cookie created by a site other than one you visited Generated in several ways, most common occurs when a Web page includes content from multiple sources DoubleClick IP address where content was delivered Records data in cookie log Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall

Case Study 9: Hadoop the Cookie Cutter (cont'd) Third-party cookie owner has history of what was shown, what ads clicked, and intervals between interactions Cookie log contains data to show how you respond to ads and your pattern of visiting various Web sites where ads placed Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall

Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall FireFox Collusion FireFox has an optional feature called Collusion that tracks and graphs all the cookies on your computer. Figure 9 shows the cookies that were placed on a computer as browser visited various Web sites. Collusion 0.22 is a Mozilla experimental add on. Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall

Ghostery in Use (ghostery.com) Who are these companies that are gathering my browser behavior data? You can find out using ghostery, another useful browser add-in feature (www.ghostery.com). How do they analyze those entries to determine which ads you clicked on? How do they then characterize differences in ads to determine which characteristics matter most to you? The answer, as you learned in Q4, is to use parallel processing. Using a MapReduce algorithm, they distribute the work to thousands of processors that work in parallel. They then aggregate the results of these independent processors and then, possibly, move to a second phase of analysis where they do it again. Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall