xPerience Exam 2

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

problems with operational data

dirty data, missing values, inconsistent data, data not integrated, wrong granularity, too much data

business intelligence

the patterns, relationships, and trends identified by BI systems. As information systems, BI systems have the five standard components: hardware, software, data, procedures, and people. The software component of a BI system is called a BI application.

bounce rate

the percentage of visitors to a particular website who navigate away from the site after viewing only one page.

support

the probability that two items will be purchased together

BI analysis

the process of creating business intelligence

publish results

the process of delivering business intelligence to the knowledge workers who need it

data acquisition

the process of obtaining, cleaning, organizing, relating, and cataloging source data

people

users of social media do what they want to do depending on their goals and their personalities. they behave in certain ways and observe the consequences. they may or may not changer their behavior.

social credentials

Third, being linked to a network of highly regarded contacts is a form of social credential. You can bask in the glory of those with whom you are related. Others will be more inclined to work with you if they believe critical personnel are standing with you and may provide resources to support you.

software

Users employ browsers and client applications to communicate with other users, send and receive content, and add and remove connections to communities and other users. These applications can be desktop or mobile applications for a variety of platforms, including iOS, Android, and Windows.

data mart

a data collection, smaller than the data warehouse, that addresses the needs of a particular department or functional area of the business

Social CRM

a dynamic, SM-based CRM process. The relationships between organizations and customers emerge in a dynamic process as both parties create and process content. in addition to the traditional forms of promotion, employees in the organization create wikis, blogs, discussion lists, frequently asked questions, sites for user reviews and commentary, and other dynamic content.

data warehouse

a facility for managing an organization's BI data

decision trees

a hierarchical arrangement of criteria that predict a classification or a value

threat

a person or organization that seeks to obtain or alter data or other IS assets illegally, without the owner's permission and often without the owner's knowledge

phishing

a similar technique for obtaining unauthorized data that uses pretexting via email

Enterprise Social Network (ESN)

a software platform that uses social media to facilitate cooperative work of people within an organization

decision support system

a synonym for decision-making BI systems

3 primary activities in the BI process

acquire data, perform analysis, publish results

what is the value of social capital?

add value in 4 ways -information -influence -social credentials -personal reinforcement

social media information system (SMIS)

an information system that supports the sharing of content among networks of users

vulnerability

an opportunity for threats to gain access to individual or organizational assets

market basket analysis

an unsupervised data mining technique for determining sales patterns

neural networks

another popular supervised data mining application used to predict values and make classifications such as "good prospect" or "poor prospect" customers

spoofing

another term for someone pretending to be someone else

Business Intelligence (BI) Systems

are information systems that process operational, social, and other data to identify patterns, relationships, and trends for use by business professionals and other knowledge workers.

hacking

breaking into computers, servers, or networks to steal data

confidence

conditional probability estimate

SM data falls into two categories

content and connections

Folksonomy

content structure that has emerged from the processing of many user tags

granularity

refers to the level of detail in the model or the decision-making process

businesses-to-consumer (B2C)

relationships to market products to end users

pull publishing

requires the user to request BI results

pay-per-click

revenue model in which advertisers display ads to potential customers for free and pay only when the customer clicks

freemium

revenue model offers users a basic service for free and then charges a premium for upgrades or advanced features

wardrivers

simply take computers with wireless connections through an area and search for unprotected wireless networks

the three SMIS Roles

social media providers, users, communities

ad-blocking software

software that filters out advertising content

safeguard

some measure that individuals or organizations take to block the threat from obtaining the asset

cluster analysis

statistical techniques identify groups of entities that have similar characteristics

email spoofing

synonym for phishing

the value of social capital

= # of relationships (x) the strength of those relationships (x) and the power of the people in those relationships

Step 4. Define your value

After pinpointing your target audience, you'll need to define the value you'll provide your audi- ence. Why should these users listen to you, go to your Web site, like your posts, or tweet about your products? Are you providing news, entertainment, education, employee recruiting, or informa- tion? In essence, you need to define what you are going to give your audience in exchange for mak- ing a connection with you.

Step 2. Identify success metrics

After you know what you want to accomplish using SM, you need to identify metrics that will indi- cate when you've achieved your goals. These are referred to as success metrics or key perfor- mance indicators (KPI). Metrics are simply measurements used to track performance. Every organization has different metrics for success. For example, a law firm may measure billable hours, a hospital may measure patients seen or procedures performed, and a manufacturer may look at units produced or operational efficiency.

unsupervised data mining

Analysts do not create a model or hypothesis before running the analysis.

hardware

Both users and organizations process SM sites using desktops, laptops, and mobile devices. In most cases, social media providers host the SM presence using elastic servers in the cloud.

social media providers

Facebook, Google+, LinkedIn, Twitter, Instagram, and Pinterest provide platforms that enable the creation of social networks ( social relationships among people with common interests)

Reinforcement

Finally, being linked into social networks reinforces a professional's identity, image, and posi- tion in an organization or industry. It reinforces the way you define yourself to the world (and to yourself). For example, being friends with bankers, financial planners, and investors may reinforce your identity as a financial professional.

Step 6: Gather And Analyze Data

Finally, when creating a social media strategy, you need to gather the right amount of data neces- sary to make the most informed decision you can. You can use online analystical tools like Google Analytics, Facebook Page Insights, Clicky, or KISSmetrics to measure the success metrics you defined earlier. These tools will show you statistical information such as which tweets get the most attention, which posts generate the most traffic, and which SM platform generates the most referrals.

influence

First, relationships in social networks can provide information about opportunities, alterna- tives, problems, and other factors important to business professionals. On a personal level, this could come in the form of a friend telling you about a new job posting or the best teacher to take for Business Law. As a business professional, this could be a friend introducing you to a potential new supplier or letting you know about the opening of a new sales territory.

information

First, relationships in social networks can provide information about opportunities, alterna- tives, problems, and other factors important to business professionals. On a personal level, this could come in the form of a friend telling you about a new job posting or the best teacher to take for Business Law. As a business professional, this could be a friend introducing you to a potential new supplier or letting you know about the opening of a new sales territory.

Business-to-business (B2B)

Now manufacturers are starting to use social media to become industry leaders, promote brand awareness, and generate new business-to-business (B2B) leads to retailers. Manufacturers can use social media by starting a blog that discusses the latest industry- related news, posts interviews with experts, and comments on new product innovations. They can also create a YouTube channel and post videos of product reviews and testing and factory walk- throughs.

procedures

On Facebook, for example, the relationships to your friends are connection data. The fact that you've liked particular organizations is also connec- tion data. Connection data differentiates SMIS from Web site applications. Both Web sites and social networking sites present user and responder content, but only social networking applica- tions store and process connection data.

SLATES

Search, Links, Authoring, Tags, Extensions, Signals McAfee defined six characteristics that he refers to with the acronym SLATES (see Figure 8-12). 42 First, workers want to be able to search for content inside the organization just like they do on the Web. Most workers find that searching is more effective than navigating content structures such as lists and tables of content. Second, workers want to access organizational con- tent via links, just as they do on the Web. They also want to author organizational content using blogs, wikis, discussion groups, published presentations, and so on. According to McAfee, a fourth characteristic of ESNs is that their content is tagged, just like content on the Web, and these tags are organized into structures, as is done on the Web at sites like Delicious (www.delicious.com). These structures organize tags as a taxonomy does, but, unlike tax- onomies, they are not preplanned; they emerge organically. In other words, ESNs employ a folk- sonomy, or a content structure that emerges from the processing of many user tags. Fifth, workers want applications that enable them to rate tagged content and to use the tags to predict content that will be of interest to them (as with Pandora), a process McAfee refers to as extensions. Finally, workers want relevant content pushed to them; or, in McAfee's terminology, they want to be sig- naled when something of interest to them happens in organizational content. Look at pic on phone.

social media (SM)

the use of information technology to support the sharing of content among networks of users

What types of security loss exist?

unauthorized data disclosure, incorrect data modification, faulty service, denial of service, loss of infrastructure

unauthorized data disclosure

when a threat obtains data that is supposed to be protected

use increases value

means the more people use a site, the more value it has, and the more people will visit

conversion rate

measures the frequency that someone who clicks on an ad makes a purchase, "likes" a site, or takes some other action desired by the advertiser

regression analysis

measures the impact of a set of variables on another variable

best practices

methods that have been shown to produce successful results in prior implementations

vanity metrics

metrics that don't improve your decision making

the functions of a data warehouse are

obtain data, cleanse data, organize and relate data, catalog data

IP spoofing

occurs when an intruder uses another site's IP address to masquerade as that other site

pretexting

occurs when someone deceives by pretending to be someone else

3 types of capital

physical, human, social

phisher

pretends to be a legitimate company and sends an email requesting confidential data

packet sniffers

programs that capture network traffic to monitor and intercept traffic on unsecured wireless (or wired) networks

sniffing

technique for intercepting computer communications

data mining

the application of statistical techniques to find patterns and relationships among data for classification and prediction

target

the asset that is desired by the threat

crowdsourcing

the dynamic social media process of employing users to participate in product design or product redesign. eBay often solicits customer to provide feedback on their eBay experience.

machine learning

the extraction of knowledge from data based on algorithms created from training data, subset of AI

human capital

the investment in human knowledge and skills for future profit

capital

the investment of resources for future profit

strength of a relationships

the likelihood that the entity (person or other organization) in the relationship will do something that benefits the organization

communication channel

the medium that carries the message

cross-selling

the method of selling the customer additional related products tied to one name

Social Media Plan Development

1. Define your goals 2. Identify success metrics 3. Identify target audience 4. Define your value 5. Make personal connections 6. Gather and analyze data

Step 5: Make Personal Connection

1. The true value of social media can be achieved only when organizations use social media to interact with customers, employees, and partners in a more personal, humane, relationship-oriented way.

communties

How the SM site chooses to relate to these communities depends on its goals. If the SM site is interested in pure publicity, it will want to relate to as many tiers of communities as it can. If so, it will create a viral hook, which is some inducement, such as a prize or other reward, for passing communications along through the tiers. If, however, the purpose of the SM site is to solve an embarrassing problem, say, to fix a product defect, then it would endeavor to constrain, as much as it can, the communications to Community A.

web 2.0

In 2006, Andrew McAfee wrote an article about how dynamic user-generated content systems, then termed Web 2.0, could be used in an enterprise setting. He described Enterprise 2.0 as the use of emergent social software platforms within companies. 41 In other words, the term Enterprise 2.0 refers to the use of enterprise social networks.

influencer

In a traditional business relationship, a client (you) has some experience with a business, such as a restaurant or resort. Traditionally, you may express your opinions about that experience by word of mouth to your social network. If you are an influencer in your social network, your opinion may force a change in others' behavior and beliefs.

you are the product

In a traditional business relationship, a client (you) has some experience with a business, such as a restaurant or resort. Traditionally, you may express your opinions about that experience by word of mouth to your social network. If you are an influencer in your social network, your opinion may force a change in others' behavior and beliefs.

step 1. define your goals

It may sound clichéd, but the first step in developing an SMIS is to clearly define what the organiza- tion wants to achieve with SM. As previously mentioned, your goals must be clear, deliberate, and aligned with the organization's competitive strategy. Without clearly defined goals, you won't know whether your SM effort was successful.

artificial intelligence (AI)

The ability of a machine to simulate human abilities such as vision, communication, recognition, learning, and decision making.

social capital

The investment people make in social relations with the expectation of returns in the marketplace

step 3. identify the target audience

The next step in creating an effective SMIS is to clearly identify your target audience. Chances are, it's not going to be everyone. For example, if you're Caterpillar Inc. trying to use social media to sell more D11 dozers, your target audience probably won't include many teenagers. Organizations go to great lengths to identify their target audience because it helps them focus their marketing efforts.

revenue models for social media

The two most common ways SM companies generate revenue are advertising and charging for premium services. On Facebook, for example, creating a company page is free, but Facebook charges a fee to advertise to communities that "like" that page.

connection data

data about relationships -On Facebook, for example, the relationships to your friends are connection data. The fact that you've liked particular organizations is also connec- tion data. Connection data differentiates SMIS from Web site applications. Both Web sites and social networking sites present user and responder content, but only social networking applica- tions store and process connection data.

content data

data and responses to data that are contributed by users -You provide the source content data for your Facebook site, and your friends provide response content when they write on your wall, make comments, tag you, or otherwise publish on your site.

supervised data mining

data miners develop a model prior to the analysis and apply statistical techniques to data to estimate parameters of the model

push publishing

delivers business intelligence to users without any request from the users

value of social capital

determined by the number of relationships in a social network, by the strength of those relationships, and by the resources controlled by those related

communities of practice (communities)

groups of people related by a common interest

5 components of SMIS

hardware, software, data, procedures, people look at phone for examples

what are the sources of threats?

human error, computer crime, natural events and disasters look at phone

Competitive Analysis

identifying and examining the characteristics of a competing firm

users

include both individuals and organizations that use SM sites to build social relationships. -More than 76 percent of people with Internet access use SM, and 80 percent of people access SM via their mobile phones. Social media providers are attracting, and targeting, certain demographic groups. For example, about 73 percent of Pinterest users are female. 4 percent of users are 25 or older.Organizations are SM users too. You may not think of an organization as a typical user, but in many ways it is. Organizations create and manage SM accounts just like you do. It's estimated that 78 percent of Fortune 500 companies maintain active Twitter accounts, 74 percent have Facebook pages, and 64 percent have YouTube accounts. These companies hire staff to maintain their SM presence, promote their products, build relationships, and manage their image.Depending on how organizations want to use SM, they can be users, providers, or both. For example, larger organizations are big enough to create and manage their own internal social media platforms such as wikis, blogs, and discussion boards. In this case, the organization would be a social media provider. We'll look at the ways social media can be used within organizations later in this chapter.

sources disciplines of data mining

look at phone


Set pelajaran terkait

Chapter 11 - Complaints, Grievances, and Conflict

View Set

Lab 3-3: Search Text Files Using Regular Expressions: Linux installation and configuration

View Set

1.1 Scientific Method/Notes Study Guide

View Set

Ch. 17 Sole Proprietorships and Partnerships

View Set