S. Goonatilake, P. Treleaven: I. S. for Finance and Business 20 years ago substantial increase in IS Killer applications - breakthrough Visa, 6 G trans.

Slides:



Advertisements
Similar presentations
The smart home of the future
Advertisements

Chapter 14 Intranets & Extranets. Awad –Electronic Commerce 1/e © 2002 Prentice Hall 2 OBJECTIVES Introduction Technical Infrastructure Planning an Intranet.
1. Parties have contractual capacity 2. Contract has legal purpose 3. Offer 4. Acceptance 5. Consideration 6. Statute of Frauds compliance.
What Is An Operating System?. Before Operating Systems u What do you do with just computer hardware? –If someone gives you a computer with no software.
CSC321: Introduction to Neural Networks and Machine Learning Lecture 24: Non-linear Support Vector Machines Geoffrey Hinton.
Lecture 8 ISM- © 2010 Houman Younessi Information Systems Spring 2011 Convener: Houman Younessi
Tom Wrosch Oregon Commercial Registries Manager 2013 IACA Annual Conference.
Security, Privacy, and Ethics Online Computer Crimes.
NETWORKING CLASSIFICATION OF COMPUTERS * Size *Cost *#of users *Storage capacity.
The Internet & The New IT Infrastructure Chapter 9.
1 Planning IT Architecture & BPR. 2 Planning IT Architecture  IT Architecture An IT architecture consists of a description of the combination of hardware,
Your Future And Information Technology By: Ikechukwa Tims.
1 Lecture 34 Introduction to Knowledge Representation & Expert Systems Overview  Lecture Objective  Introduction to Knowledge Representation  Knowledge.
Chapter 2 Information Technology Concepts & Issues.
Machine Learning Methods for Personalized Cybersecurity Jaime G. Carbonell Eugene Fink Mehrbod Sharifi Applying machine learning and artificial intelligence.
Overview Distributed vs. decentralized Why distributed databases
Introduction to the new mainframe: Large-Scale Commercial Computing © Copyright IBM Corp., All rights reserved. Chapter 1: The new mainframe.
Lead Black Slide. © 2001 Business & Information Systems 2/e2 Chapter 11 Management Decision Making.
MACHINE LEARNING AND ARTIFICIAL NEURAL NETWORKS FOR FACE VERIFICATION
Definition of terms Definition of terms Explain business conditions driving distributed databases Explain business conditions driving distributed databases.
Jordan University of Science & Technology Faculty of Computer & Information Technology Department of Computer Science & Information Systems.
By : Anas Assiri.  Introduction  fraud detection  Immune system  Artificial immune system (AIS)  AISFD  Clonal selection.
TECHNOLOGY GUIDE 3: Emerging Types of Enterprise Computing
Software Engineering 2 Software and Society Mark J. Christensen Presented by: Feras Batarseh.
CPSC 335 BTrees Dr. Marina Gavrilova Computer Science University of Calgary Canada.
Managing Risk in Cloud Computing Contracts Henry Ward and Todd Taylor April 30, 2015.
INTELLIGENT SYSTEMS BUSINESS MOTIVATION BUSINESS INTELLIGENCE M. Gams.
INTELLIGENT SYSTEMS MOTIVATIONS M. Gams. Definition (scientific): Intelligent ststem is a system that learns during its existence. It senses its environment.
* Since the late 1970’s China’s economy has been growing at a very fast pace. * Today the factories of China manufacture products for much of the world.
10/6/2015 1Intelligent Systems and Soft Computing Lecture 0 What is Soft Computing.
Models of Situations. A computer model of a system is a program and data which behaves like the real thing, e.g. a driving simulation, a graph of business.
ICT IGCSE.  Introducing or changing a system needs careful planning  Why?
1 Information Security Practice I Lab 5. 2 Cryptography and security Cryptography is the science of using mathematics to encrypt and decrypt data.
Impact of ICT on Society – Part the first ICT 1_6.
Artificial intelligence
INTELLIGENT SYSTEMS INFORMATION SOCIETY MOTIVATIONS M. Gams.
CH. 17 Class Discussion MANAGING OPERATIONS AND STAFFING.
INTELLIGENT SYSTEMS AND INFORMATION SOCIETY M. Gams Institut Jožef Stefan Ljubljana University.
Chapter 4 Intranets and Extranets. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES Introduction Technical Infrastructure Planning.
Chapter 9  2000 by Prentice Hall. 9-1 Client/Server Computing.
Information Technology and Organizational Decision Making G. P. Huber Presented by Shufan Wei.
Outrageous Opinion: Nothing We Do Can Improve Security Edward W. Felten Secure Internet Programming Lab Dept. of Computer Science Princeton University.
S. Goonatilake, P. Treleaven: I. S. for Finance and Business 10 years ago substantial increase in I.s. Killer applications - breakthrough Visa, 6 G trans.
INTELLIGENT SYSTEMS 3. M. Gams. Intelligent systems ENGINEERING, TECHNOLOGY ARTIFICIAL INTELLIGENCE IN. SOCIETY.
OUR FUTURE: TOGETHER WE CAN THRIVE Department of Finance: Treasury Division.
Enterprise Resource Planning (ERP) The need for integrated information in business.
SIMULATION MODELLING. Your exam Lesson objectives To be able to define and understand: Definition of a simulation model. Advantages and disadvantages.
What are Background Checking Applications? By: Intelifi Screening Technology.
Online Shopping. Learning Objectives To learn how society has been affected by online shopping (e-Commerce)
INTELIGENTNI SISTEMI POSLOVNA INTELIGENCA M. Gams.
ATTENDANCE MANAGEMENT SYSTEM. PRODUCT DESCRIPTION Attendance Management System: is a user-friendly, flexible and full featured employee attendance management.
Lecture 2 Page 1 CS 236 Online Security Policies Security policies describe how a secure system should behave Policy says what should happen, not how you.
© Copyright Nanda Ganesan1 CHAPTER NT Domains. © Copyright Nanda Ganesan2 Chapter Objectives Give an overall picture of the NT networking architecture.
The Costs and Methods of Obtaining Credit Morgan Napier and Kaitlin Nelke.
A Brief Introduction Radiant Pay, a global provider of payment processing services to all kinds of business, Radiant Pay Services.
INTELLIGENT SYSTEMS BUSINESS MOTIVATION BUSINESS INTELLIGENCE
TECHNOLOGY GUIDE FOUR Intelligent Systems.
3.2 Virtualisation.
INTELIGENTNI SISTEMI POSLOVNA INTELIGENCA
Dynamics 365 for Finance and Operations – Elevator Pitch
INTELLIGENT SYSTEMS BUSINESS MOTIVATION
VPN What, where, who, why when?.
Tap into a new market with Office 365 Government
Intelligent Systems and
Estonia Martti Mandel Senior Expert
INTELLIGENT SYSTEMS BUSINESS MOTIVATION BUSINESS INTELLIGENCE
The Ring Network Advantages: They are cheap to expand.
Cryptocurrency and Blockchain Technology
Presentation transcript:

S. Goonatilake, P. Treleaven: I. S. for Finance and Business 20 years ago substantial increase in IS Killer applications - breakthrough Visa, 6 G trans. ann., 550G$, security; American Express, 15$ > 1.4$ typical: lots of data, new AI and HW cap. quality improvement, lower costs,

Killer application American Express, Visa Authorizer’s Assistant - an expert system before: simple rigid rules, majority left to human supervisors, many people with different performance Then new: an expert / intelligent system with many rules, copies expert supervisors, faster, cheaper, more equilibrated 15% > 1.4$ per one transaction (Visa - an neural network – DM and ML prevail)

American Express, Visa Before a centralized application on a mainframe, then lots of preprocessing on PCs and only some centralized Before every transaction (except simplest) examined by humans, then only complicated ones Before much slower (humans are slow, are not working at night …), then faster (most by computers only 24 hours a day) - fraud causes loses of money, faster also costs less, users more satisfied, also safer

Benefits The key question – trust – can IS be trusted - obviously good enough (actually as good as average humans) Intelligent systems enabled organizational changes in terms of HW, SW and humans Less employed, more work done by computers Work done better and faster, more profits, cheaper transactions

Properties Learning Flexibility Adaptation Explanation Discovery