Business Driven Technology
7th Edition
ISBN: 9781259567322
Author: Paige Baltzan Instructor
Publisher: McGraw-Hill Education
expand_more
expand_more
format_list_bulleted
Expert Solution & Answer
Chapter 8, Problem 3MBD
Explanation of Solution
Impact of given errors in an organization:
A cascading spelling mistake:
- This mistake can cause numerous problems in organization. If entering a customer name wrongly, it would affect all marketing campaigns and it will make loss to an organization.
- If spelling of the product not correct then it can make trouble to organization and it may cause trust of the company.
Inaccurate customer records:
- This kind of mistake can make negative impact of an organization. If an employee has one customer information in many systems in different ways, the employee thinks the organization has many customers instead of one customer and this misunderstanding can make inaccurate analysis.
- Inaccurate customer records may affect organization’s revenue because the inaccurate data needs time and money to repair the fault.
Incomplete purchasing history:
- The incomplete purchasing history may lose customers because the organization won’t know customer trends and patterns...
Expert Solution & Answer
Want to see the full answer?
Check out a sample textbook solutionStudents have asked these similar questions
Cumulative ACK. What is meant by a cumulative acknowledgment, ACK(n)?
Case study
Weather Forecasting System (WFS) is the application of science and technology to predict the conditions of the atmosphere for a given location and time. Weather forecasts are made by collecting as much data as possible about the current state of the atmosphere (particularly the temperature, humidity and wind) and using understanding of atmospheric processes (through meteorology) to determine how the atmosphere evolves in the future. During the data assimilation process, information gained from the observations is used in conjunction with a numerical model's most recent forecast for the time that observations were made to produce the meteorological analysis.There is a vast variety of end uses to weather forecasts. Weather warnings are important forecasts because they are used to protect life and property. Forecasts based on temperature and precipitation are important to agriculture, and therefore to…
Problem: Security breaches and confidentiality of personal data are important considerations in modern system design. We have all heard the saying that “knowledge is power.” With the collection, categorization, and analysis of big data, companies can know more about their clients as a whole than the sum of their individual activities. The simple example of selling subscriber mailing lists has been dealt with, but what about mining transactions to create a custom profile of client trends, and then selling this aggregate information? A company cannot pass on your personal information to another company, but can it pass on the metadata of all of its clients? For example, can a company that supplies web hosting for ecommerce sites mine the transactions of those websites and sell the aggregate traffic information to competing companies? Search the literature on this subject and produce a report on the legal, moral, and ethical considerations of such an activity.
Question: explain…
Chapter 8 Solutions
Business Driven Technology
Ch. 8 - Prob. 1OCCh. 8 - Prob. 2OCCh. 8 - Prob. 3OCCh. 8 - Prob. 1CQCh. 8 - Prob. 2CQCh. 8 - Prob. 3CQCh. 8 - Prob. 4CQCh. 8 - Prob. 1RQCh. 8 - Prob. 2RQCh. 8 - Prob. 3RQ
Ch. 8 - Prob. 4RQCh. 8 - Prob. 5RQCh. 8 - Prob. 6RQCh. 8 - Prob. 7RQCh. 8 - Prob. 8RQCh. 8 - Prob. 3MBDCh. 8 - Prob. 4MBDCh. 8 - Prob. 6MBDCh. 8 - Prob. 7MBDCh. 8 - Prob. 1CCOCh. 8 - How does data visualization use database...Ch. 8 - Prob. 3CCOCh. 8 - What is the correlation between data mining and...Ch. 8 - Prob. 5CCOCh. 8 - Prob. 6CCOCh. 8 - What could happen to a data visualization project...Ch. 8 - Prob. 1AYKCh. 8 - Prob. 2AYKCh. 8 - Prob. 4AYKCh. 8 - Prob. 5AYKCh. 8 - Prob. 7AYKCh. 8 - Prob. 8AYK
Knowledge Booster
Similar questions
- Problem: Security breaches and confidentiality of personal data are important considerations in modern system design. We have all heard the saying that “knowledge is power.” With the collection, categorization, and analysis of big data, companies can know more about their clients as a whole than the sum of their individual activities. The simple example of selling subscriber mailing lists has been dealt with, but what about mining transactions to create a custom profile of client trends, and then selling this aggregate information? A company cannot pass on your personal information to another company, but can it pass on the metadata of all of its clients? For example, can a company that supplies web hosting for ecommerce sites mine the transactions of those websites and sell the aggregate traffic information to competing companies? Search the literature on this subject and produce a report on the legal, moral, and ethical considerations of such an activity. Question: Discuss…arrow_forwardProblem: Security breaches and confidentiality of personal data are important considerations in modern system design. We have all heard the saying that “knowledge is power.” With the collection, categorization, and analysis of big data, companies can know more about their clients as a whole than the sum of their individual activities. The simple example of selling subscriber mailing lists has been dealt with, but what about mining transactions to create a custom profile of client trends, and then selling this aggregate information? A company cannot pass on your personal information to another company, but can it pass on the metadata of all of its clients? For example, can a company that supplies web hosting for ecommerce sites mine the transactions of those websites and sell the aggregate traffic information to competing companies? Search the literature on this subject and produce a report on the legal, moral, and ethical considerations of such an activity. Question: discuss…arrow_forwardDefine the relationship between data and informationarrow_forward
- Making Elevators Go Faster!This story has been reported in numerous places and has almost become a classic example to explain the need for problem identification. Ackoff (as cited in Larson , 1987) described the problem of managing complaints about slow elevators in a tall hotel tower.After trying many solutions for reducing the complaint: staggering elevators to go to different floors, adding operators, and so on, the management determined that the real problem was not about the actual waiting time but rather the perceived waiting time. So the solution was to install full-length mirrors on elevator doors on each floor. As Hesse and Woolsey (1975) put it, "the women would look at themselves in the mirrors and make adjustments, while the men would look at the women, and before they knew it, the elevator was there ." By reducing the perceived waiting time, the problem went away. Baker and Cameron 0996) give several other examples of distractions, including lighting,…arrow_forwardPredictive modeling: Task: Ambulance Demand Data Generating Process: Using the service data: The data is collected by the " NYC Traffic data” to answer the questions: Frequency of data collection {how often is the data collected? After every incident? Daily? Yearly?} Agency / Organization collecting the data {who specifically is collecting the data? Please avoid using general references like “government” or “police} Original Unit of Analysis {What is the original unit of analysis for the data as provided? Calls for service? Census tracts? Cities?} Transformed Unit of Analysis{i.e. are you modifying the call data to support your model? Hint: if you are doing “demand” model you will be aggregating the data.} Data Generation Description{here, I want you in your own words to describe how you think the data was generated. Think 2-3 sentences.} Data Collector{Who collects the data? A dispatcher? A Census taker?} Triggering Process{What triggers the data to be collected?…arrow_forwardSource: “The Hidden Minefields in Sales Force Automation Technologies,” Journal of Marketing, July 2002, by C. Speier and V. Venkatesh. Several years ago, a well-known national real estate company built a computer-based system to help its real estate agents sell houses more quickly. The system, which worked in many ways like an early version of realtor.com, enabled its agents to search the database of houses for sale to find houses matching the buyer's criteria using a much easier interface than the traditional system. The system also enabled the agent to show the buyer a virtual tour of selected houses listed by the company itself. It was believed that by more quickly finding a small set of houses more closely matching the buyer's desires, and by providing a virtual tour, the buyers (and the agent) would waste less time looking at unappealing houses. This would result in happier buyers and in agents who were able to close sales more quickly, leading to more sales for the company and…arrow_forward
- Mathematical induction is used to determine the truth for a set of statements, such as the "domino effect" found in the Fibonacci sequence often shown in art, nature, and various areas of technology. Specifically, the software used by the stock market relies on mathematical induction to set price targets, establish potential changes in trends, and determine resistance to the patterns established during trading. What other computer-science or IT jobs rely on mathematical induction?arrow_forwardWhat does the term "computer analysis" mean?arrow_forwardComputer Science The government has recognized that it has a problem guaranteeing the supply of medicines throughout the country. To solve this, he is considering hiring a "Data Scientist" to help them. You, as an expert in statistics and information science, know that you can perform simulations of different scenarios. Describe IN LUXURY DETAIL how you could help him. Note: you must provide information on all the steps involved in your solution so that they decide to hire you.arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Principles of Information Systems (MindTap Course...Computer ScienceISBN:9781285867168Author:Ralph Stair, George ReynoldsPublisher:Cengage LearningFundamentals of Information SystemsComputer ScienceISBN:9781305082168Author:Ralph Stair, George ReynoldsPublisher:Cengage Learning
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781285867168
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Fundamentals of Information Systems
Computer Science
ISBN:9781305082168
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning