kroenke_umis8e_inppt09x
Download
Report
Transcript kroenke_umis8e_inppt09x
Chapter 9
Business Intelligence Systems
“Data analysis, where you don’t know the second question to ask
until you see the answer to the first one.”
• Tracking race competitors from each of event, and
having unbelievable success selling products to them.
• Want to match competitors to personal trainers in
same locale.
• Earn referral fee.
• How to track them? Mailing address? IP address?
Copyright © 2016 Pearson Education, Inc.
9-2
Study Questions
Q1: How do organizations use business intelligence (BI) systems?
Q2: What are the three primary activities in the BI process?
Q3: How do organizations use data warehouses and data marts to acquire
data?
Q4: How do organizations use reporting applications?
Q5: How do organizations use data mining applications?
Q6: How do organizations use BigData applications?
Q7: What is the role of knowledge management systems?
Q8: What are the alternatives for publishing BI?
Q9: 2025?
Copyright © 2016 Pearson Education, Inc.
9-3
Q1: How Do Organizations Use Business
Intelligence (BI) Systems?
Components of Business
Intelligence System
Copyright © 2016 Pearson Education, Inc.
9-4
How Do Organizations Use BI?
Copyright © 2016 Pearson Education, Inc.
9-5
What Are Typical Uses for BI?
• Identifying changes in purchasing patterns
– Important life events cause customers to change what they buy.
• BI for entertainment
– Netflix has data on watching, listening, and rental habits, however,
determines what people actually want, not what they say.
• Predictive policing
– Analyze data on past crimes, including location, date, time, day of
week, type of crime, and related data, to predict where crimes are
likely to occur.
Copyright © 2016 Pearson Education, Inc.
9-6
Q2: What Are the Three Primary Activities in the BI
Process?
Copyright © 2016 Pearson Education, Inc.
9-7
Using Business Intelligence to Find Candidate
Parts at AllRoad
• Identified criteria for parts customers might want to print
– Provided by vendors who already agree to make
part design files available for sale
– Purchased by larger customers
– Frequently ordered parts
– Ordered in small quantities
• Simple in design (part weight and price as surrogates)
Copyright © 2016 Pearson Education, Inc.
9-8
Acquire Data: Extracted Order Data
Copyright © 2016 Pearson Education, Inc.
9-9
Sample Extracted Data: Part Data Table
Copyright © 2016 Pearson Education, Inc.
9-10
Joining Order Extract and Filtered Parts Tables
Copyright © 2016 Pearson Education, Inc.
9-11
Sample Orders and Parts View Data
Copyright © 2016 Pearson Education, Inc.
9-12
Creating the Customer Summary Query
Copyright © 2016 Pearson Education, Inc.
9-13
Customer Summary
Copyright © 2016 Pearson Education, Inc.
9-14
Qualifying Parts Query Design
Copyright © 2016 Pearson Education, Inc.
9-15
Publish Results: Qualifying Parts Query Results
Figure
Copyright © 2016 Pearson Education, Inc.
9-16
Publish Results: Sales History for Selected
Parts
Copyright © 2016 Pearson Education, Inc.
9-17
Ethics Guide: Unseen Cyberazzi
• Data broker or Data aggregator
– Acquires and purchases consumer and other data
from public records, retailers, Internet cookie
vendors, social media trackers, and other sources
– Uses it to create business intelligence to sell to
companies and the government
Copyright © 2016 Pearson Education, Inc.
9-18
Ethics Guide: Unseen Cyberazzi (cont'd)
• Cheap cloud processing makes processing consumer
data easier and less expensive every day
• Processing happens in secret, behind closed doors
• Data brokers enable you to view data stored about you
– Difficult to learn how to request your data and
torturous to file for it, data usefulness limited
Copyright © 2016 Pearson Education, Inc.
9-19
Ethics Guide: Unseen Cyberazzi (cont'd)
• Do you know what data is gathered about you and what is done
with it?
• Have you thought about conclusions data aggregators, or their
clients, could make based on your use of frequent buyer cards?
• Concerned about actions federal government may be taking with
regard to data it gathers or buys from data aggregators?
• Where does all of this end? What will life be like for your children
or grandchildren?
Copyright © 2016 Pearson Education, Inc.
9-20
Q3: How Do Organizations Use Data Warehouses
and Data Marts to Acquire Data?
• Functions of a Data Warehouse
– Extract data from operational, internal
and external databases
– Cleanse data
– Organize, relate data warehouse
– Catalog data using metadata
Copyright © 2016 Pearson Education, Inc.
9-21
Components of a Data Warehouse
Copyright © 2016 Pearson Education, Inc.
9-22
Examples of Consumer Data That Can Be
Purchased
Copyright © 2016 Pearson Education, Inc.
9-23
Possible Problems with Source Data
Curse of
dimensionality
Copyright © 2016 Pearson Education, Inc.
9-24
Data Mart Examples
Copyright © 2016 Pearson Education, Inc.
9-25
Q4: How Do Organizations Use Reporting
Applications?
• Create meaningful information from disparate
data sources
• Deliver information to user on time
• Basic operations:
1. Sorting
2. Filtering
3. Grouping
4. Calculating
5. Formatting
Copyright © 2016 Pearson Education, Inc.
9-26
RFM Analysis: Example RFM Scores
• Recently
• Frequently
• Money
Copyright © 2016 Pearson Education, Inc.
9-27
RFM Analysis Classification Scheme
Copyright © 2016 Pearson Education, Inc.
9-28
Example of Grocery Sales OLAP Report
http://dwreview.com/OLAP/
http://www.tableausoftware.com
OLAP Product Family by Store Type
Copyright © 2016 Pearson Education, Inc.
9-29
Example of Expanded Grocery Sales OLAP Report
Drill
down
Copyright © 2016 Pearson Education, Inc.
9-30
Example of Drilling Down into Expanded Grocery
Sales OLAP Report
Copyright © 2016 Pearson Education, Inc.
9-31
Q5: How Do Organizations Use Data Mining
Applications?
Copyright © 2016 Pearson Education, Inc.
9-32
Unsupervised Data Mining
• Analyst does not start with a priori hypothesis or model
• Hypothesized model created based on analytical results
to explain patterns found
• Example: Cluster analysis
Copyright © 2016 Pearson Education, Inc.
9-33
Supervised Data Mining
• Uses a priori model to compute outcome of model
• Prediction, such as regression analysis
• Ex: CellPhoneWeekendMinutes
= (12 +
(17.5*CustomerAge)+(23.7*NumberMonthsOfAccount)
= 12 + 17.5*21 + 23.7*6 = 521.7
Copyright © 2016 Pearson Education, Inc.
9-34
Market-Basket Analysis
• Market-basket analysis
– Identify sales patterns in large volumes of data
– Products customers tend to buy together
– Probabilities of customer purchases
– Identify cross-selling opportunities
Customers who bought fins also bought a mask.
Copyright © 2016 Pearson Education, Inc.
9-35
Market-Basket Example: Dive Shop
Transactions = 400
Copyright © 2016 Pearson Education, Inc.
9-36
Decision Trees
• Hierarchical arrangement of criteria to predict a
classification or value
• Unsupervised data mining technique
• Basic idea of a decision tree
– Select attributes most useful for classifying
something on some criteria to create “pure
groups”
Copyright © 2016 Pearson Education, Inc.
9-37
Credit
Score
Decision
Tree
Copyright © 2016 Pearson Education, Inc.
9-38
Decision Rules for Accepting or Rejecting Offer to
Purchase Loans
• If percent past due is less than 50 percent, then
accept loan.
– If percent past due is greater than 50 percent
and
– If CreditScore is greater than 572.6 and
– If CurrentLTV is less than .94, then accept loan.
• Otherwise, reject loan.
Copyright © 2016 Pearson Education, Inc.
9-39
So What?
• Data storytelling
– Technique for presenting results of business intelligence
– A story is an ordered sequence of steps with a pre-defined path.
– Steps consist of interactive dashboard displays of business
intelligence results.
– Purpose of a data story is to explain that why.
o Provide context and direction, opinions, arguments about
what data reveals.
– Data story authors are business professionals like you, not
technologists.
Copyright © 2016 Pearson Education, Inc.
9-40
Q6: How Do Organizations Use BigData
Applications?
• Huge volume – petabyte and larger
• Rapid velocity – generated rapidly
• Great variety
– Structured data, free-form text,
log files, graphics, audio, and
video
Copyright © 2016 Pearson Education, Inc.
9-41
MapReduce Processing Summary
Google search log
broken into pieces
Copyright © 2016 Pearson Education, Inc.
9-42
Google Trends on the Term Web 2.0
Copyright © 2016 Pearson Education, Inc.
9-43
Hadoop
• Open-source program supported by Apache Foundation2
• Manages thousands of computers
• Implements MapReduce
– Written in Java
• Amazon.com supports Hadoop as part of EC3 cloud offering
• Query language entitled Pig (platform for large dataset analysis)
Easy to master
– Extensible
– Automatically optimizes queries on map-reduce level
Copyright © 2016 Pearson Education, Inc.
9-44
Q7: What Is the Role of Knowledge Management
Systems?
• Knowledge Management
– Creating value from intellectual capital and sharing
knowledge with those who need that capital
– Preserving organizational memory by capturing and
storing lessons learned and best practices of key
employees
Copyright © 2016 Pearson Education, Inc.
9-45
Benefits of Knowledge Management
• Improve process quality
• Increase team strength
• Goal:
– Enable employees to use organization’s
collective knowledge
Copyright © 2016 Pearson Education, Inc.
9-46
What Are Expert Systems?
Expert systems
Rule-based
IF/THEN
Encode human
knowledge
Expert systems shells
Process IF side
of rules
Report values of
all variables
Knowledge gathered
from human experts
Copyright © 2016 Pearson Education, Inc.
9-47
Example of IF/THEN Rules
Copyright © 2016 Pearson Education, Inc.
9-48
Drawbacks of Expert Systems
1. Difficult and expensive to develop
– Labor intensive
– Ties up domain experts
2. Difficult to maintain
– Changes cause unpredictable outcomes
– Constantly need expensive changes
3. Don’t live up to expectations
– Can’t duplicate diagnostic abilities of
humans
Copyright © 2016 Pearson Education, Inc.
9-49
What Are Content Management Systems (CMS)?
• Support management and delivery of documents,
other expressions of employee knowledge
• Challenges of Content Management
– Databases are huge
– Content dynamic
– Documents do not exist in isolation
– Contents are perishable
– In many languages
Copyright © 2016 Pearson Education, Inc.
9-50
What are CMS Application Alternatives?
• In-house custom development
– Customer support department develops in-house
database applications to track customer problems
• Off-the-shelf
– Horizontal market products (SharePoint)
– Vertical market applications
• Public search engine
– Google
Copyright © 2016 Pearson Education, Inc.
9-51
How Do Hyper-Social Organizations Manage
Knowledge?
• Hyper-social knowledge management
– Application of social media and related applications for
management and delivery of organizational knowledge
resources
• Hyper-organization theory
– Framework for understanding this new direction in KM
– Focus shifts from knowledge and content per se to
fostering authentic relationships among creators and
users of knowledge
Copyright © 2016 Pearson Education, Inc.
9-52
Hyper-Social
KM Alternative
Media
Copyright © 2016 Pearson Education, Inc.
9-53
Resistance to Hyper-Social Knowledge Sharing
• Employees can be reluctant to exhibit their ignorance
• Employee competition
• Remedy
– Strong management endorsement
– Strong positive feedback
– “Nothing wrong with praise or cash . . . especially
cash”
Copyright © 2016 Pearson Education, Inc.
9-54
Q8: What Are the Alternatives for Publishing BI?
Copyright © 2016 Pearson Education, Inc.
9-55
What Are the Two Functions of a BI Server?
Copyright © 2016 Pearson Education, Inc.
9-56
Q9: 2025?
• World generating and storing exponentially more information
about customers, and data mining techniques are better
• Companies know more about your purchasing habits and
psyche
• Social singularity – Machines build their own information
systems
• Will machines possess and create information for
themselves?
Copyright © 2016 Pearson Education, Inc.
9-57
Guide: Semantic Security
1. Unauthorized access to protected data and information
• Physical security
Passwords and permissions
Delivery system must be secure
2. Unintended release of protected information through
reports and documents
3. What, if anything, can be done to prevent what Megan
did?
Copyright © 2016 Pearson Education, Inc.
9-58
Guide: Data Mining in the Real World
• Problems:
– Dirty data
– Missing values
– Lack of knowledge at start of project
– Over fitting
– Probabilistic
– Seasonality
– High risk – unknown outcome
Copyright © 2016 Pearson Education, Inc.
9-59
Active Review
Q1: How do organizations use business intelligence (BI) systems?
Q2: What are the three primary activities in the BI process?
Q3: How do organizations use data warehouses and data marts to
acquire data?
Q4: How do organizations use reporting applications?
Q5: How do organizations use data mining applications?
Q6: How do organizations use BigData applications?
Q7: What is the role of knowledge management systems?
Q8: What are the alternatives for publishing BI?
Q9: 2025?
Copyright © 2016 Pearson Education, Inc.
9-60
Case Study 9: Hadoop the Cookie Cutter
• Third-party cookie created by a site other than
one you visited
• Generated in several ways, most common occurs
when a Web page includes content from multiple
sources
• DoubleClick
– IP address where content was delivered
– Records data in cookie log
Copyright © 2016 Pearson Education, Inc.
9-61
Case Study 9: Hadoop the Cookie Cutter (cont'd)
• Third-party cookie owner has history of what was
shown, what ads clicked, and intervals between
interactions
• Cookie log contains data to show how you respond
to ads and your pattern of visiting various Web
sites where ads placed
Copyright © 2016 Pearson Education, Inc.
9-62
FireFox Lightbeam: Display on Start Up
No Cookies
Copyright © 2016 Pearson Education, Inc.
9-63
After Visiting MSN.com
Copyright © 2016 Pearson Education, Inc.
9-64
5 Sites Visited Yields 27 Third Parties
Copyright © 2016 Pearson Education, Inc.
9-65
Sites Connected to Doubleclick
Copyright © 2016 Pearson Education, Inc.
9-66
Copyright © 2016 Pearson Education, Inc.
9-67